Analysing Five Layers Of Computer Security

Analysing Five Layers Of Computer Security



In my previous article, I have discussed at length some of the facts that you need to know about computer security. In this article, I want to look at the five layers of computer security. Follow me as we will be analysing this together in this article.


#1 Physical Security

This has to do with the process of safeguard network hardware, computers, and other infrastructure from intruders and thieves.


Most at times, you have to ensure that computer devices are kept away from locations where they can be damaged or tampered with. You have to keep some of these data away from unauthorised access as much as possible.

NHS Header


#2 Network Security 

This has to do with protecting your network appliances and there services from unauthorised modification, destruction and disclosure.


This will prevent hackers and unauthorised users from having access to your network resources. 



#3 System security 

This protect system and it’s resources as well as information from corruption, theft and unauthorised access to users resources. This will ensure that computer systems available in the organisation are kept secured. 



#4 Application Security

This has to do with the use of software, hardware and procedural methods to protect applications against external attacks.


It has to do with all measures that organisations have put in place in order to ensure that users are secured when using organisations resources. 



#5 User security 

This ensures that a valid user is logged in and that the logged-in user is allowed to have access to all the resources that are needed in order to guarantee user experience. 



Action Point
PS: If you would like to have an online course on any of the courses that you found on this blog, I will be glad to do that on individual and corporate level, I will be very glad to do that I have trained several individuals and groups and they are doing well in their various fields of endeavour. Some of those that I have trained includes staffs of Dangote Refinery, FCMB, Zenith Bank, New Horizons Nigeria among others. Please come on Whatsapp and let’s talk about your training. You can reach me on Whatsapp HERE. Please note that I will be using Microsoft Team to facilitate the training.

I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.


Fact Check Policy

CRMNIGERIA is committed to fact-checking in a fair, transparent and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.


Become Part Of our Fan Base on Facebook. Click Here.
Follow Us on Twitter. Click Here.
Many Crypto. One place. Use Roqqu

Hi, I now use RavenBank to send, receive and save money. I also pay my bills with ease, you should try it out too


Fact Check Policy



Adeniyi Salau

Adeniyi Salau is a highly dedicated and committed Blogger of repute. He likes sharing his IT knowledge with others. My desire is to impact as many lives as possible with my IT skills. You can download my mobile APP. Download the ICTLOAD APP on Google Playstore. Thanks.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button