Importance Of Electronic Security In Today’S World

0 / 5. 0

Importance of electronic security in today’s world


The development of this essay highlights the importance of electronic security in today’s world in addition to identifying its components and operation processes as well as the respective update that this medium suffers due to the constant change of the technology. 

The evolution of technology has changed society to a level that many times the business sector is forced to work under the implementation of these systems in addition to technifying and many times seeks to replace the activities of a human being. These systems are mostly developed by first world countries and given this many countries that do not have infrastructure or are non -developed countries do not have access to these new generation systems, causing as impact the reduction of jobs thatIn turn, they generate new types of jobs but these clearly do not occur in a generalized way but in certain places.

“It is defined as the set of techniques, tools and procedures that allow protecting the systems, communications and information that are handled in the technological universe."

ICTs take us to a digital world with infinite possibilities, but it also implies complexity to protect networks, services and applications is greater. Databases, mobile devices, search engines, social networks and electronic commerce portals are especially sensitive to security issues.


“The electronic security system refers to any electronic equipment that can perform security operations such as surveillance, access control, alarm or intrusion control to an installation or area that uses a power supply source and also a backup ofenergy as drums, etc.

It also includes some of the operations such as electrical gear, mechanical. The determination of a type of security system is based exclusively on the area to be protected and its threats.”(Sivytec, consulted in 2020)

When we talk about electronic security it is generally related to security cameras, alarms against robberies etc., But this concept currently changes radically since it not only encompasses physical protection against threats through electronic if not the security as an internet user, that is, the protection of information. 

Types of computer security

  • Router 

A router is a hardware device that allows network computers interconnection.

The router or router is a device that operates in layer three of 3 level. Thus, it allows several networks and computers to connect with each other and, for example, share the same Internet connection.

A router uses a routing protocol, which allows you.

A typical router works in a control plane (in this plane the device obtains information about the most effective output for a specific data package) and on a forwarding plane (on this plane the device is responsible for sending the data packagereceived to another interface). (Techlandia)

Navigation security 

  • Use of antivirus

Antivirus is called software used to eliminate programs elaborated with destructive intention. Thus, antivirus emerged as a solution to the proliferation of malicious software when the use of personal computers began to massify and thus a new market emerged. (DEFINITION)

A computer virus has the main purpose of altering the operation of the computer behind the user. The existing virus spectrum exhibits from programs capable of deleting computer data, to some that only cause discomfort. Computer viruses lack the ability to replicate, require software that serves as a guest;When it runs, the virus gets up in RAM, begins to handle operating system programs and infect the executable files used, definitively recorded on the rigid disc.

The first registered virus dates from 1972 and received the name of Creeper (for successively writing the phrase "I am a vine … grab it if you can"). Ironically gave rise to the first antivirus, called "Cortador". From that moment on, the proliferation of viruses began to grow, especially since the mid -1980s.

The most common method that an antivirus uses to detect the presence of a computer virus is to compare files against a database with virus records. It is also possible to detect malicious activity to identify unknown viruses or emulate files and record the activities carried out by programs.

Since the computer security provided by antivirus rests mainly on the use of a comparison against a database, it is understandable that these continually require updates, in order to expand this virus record as new malicious elements are discovered.

  • Use of antimalware

Anti-Malware software blocks and eliminates malware and efficient. This software includes the core of protection of security suites, although obviating some extras that are not necessary to combat malware, such as parental control or password administrators.

Anti-Malware software blocks and eliminates malware and efficient. This software includes the core of protection of security suites, although obviating some extras that are not necessary to combat malware, such as parental control or password administrators.

The malware to which these products should combat is the most varied and includes: viruses, Trojans, Keyloggers (record keyboard pulsations), pop-ups or emerging windows, rootkits, adware and malicious scritps. Nowadays it is no longer necessary. Antimalware protection is perfect for those who are aware of the dangers of malware and want to fight them, but without implying being interrupted by the program or having to pay for more than strictly necessary.

  • Use of antispyware

Antispyware is a security technology that helps protect a team against Spyware and other potentially unwanted software. This software helps reduce the effects caused by Spyware including the slow performance of the equipment, emerging messages, unwanted changes in internet configurations and unauthorized use of private information. It allows users to protect against programs whose intention is to trace information on consumption and navigation habits, or worse, obtain passwords and other sensitive data.

Spyware is a type of malicious program, also called malware, which sends information from a computer to a third party without user’s knowledge or consent. The data recovered by these programs may vary, but many collect information on the Internet habits of a user, their online purchases, and even keyboard pulsations, such as passwords. In addition, these programs can change the configuration and functionality of the computer. The antispyware tries to block or eliminate these programs.

Antispyware works mainly two ways. The first is the capture of incoming spy software in real time. This system analyzes the computer transactions that come from the Internet. When it detects a potential spyware, it tries to block it before the malicious program has the opportunity to place in the root directory, or in another area of the team. This real -time detection is normally produced at the time of discharge.

The second type of antispyware uses an update list of known spyware to protect the computer. Many users usually download new versions of this record to maintain their updated software. Instead of blocking the download of potentially harmful programs, this type of software detects and eliminates those that have already entered the computer.

Antispyware of this type normally analyzes the registration, programs and files of the operating system. Then compare these files with the known malware list. If a file coincides with one on the list, the antispyware isolates it and eliminates it. (ConsumerFTC)

  • Use of Firewall

A Firewall is a network safety device that monitors network traffic -Entrant and outgoing- and decides whether it allows or blocks specific traffic based on a defined set of safety rules.

Firewalls have constituted a network defense first line for more than 25 years. They establish a barrier between protected and controlled internal networks in which you can trust and external networks that are not trustworthy, such as the Internet.

  • SSL Security

SSL (Secure Sockets Layer or safe connection layer) is a global safety standard that allows encrypted data transfer between a browser and a web server. It is used by millions of companies and individuals online in order to reduce the risk of theft and manipulation of confidential information (such as credit card numbers, user names, passwords, emails, etc.) On the part of hackers and identities thieves. Basically, the SSL layer allows two parties to have a private ‘conversation’.

(UNAM Magazine)

To establish this safe connection, a SSL certificate (also called ‘digital certificate’) is installed on a web server that meets two functions:

  • Authenticate the identity of the website, guaranteeing visitors who are not in a false site.
  • Encrypt the information transmitted.
  • Phishing

Phishing is used to refer to one of the methods most used by cybercriminal criminals to scam and obtain fraudulent confidential information such as a password or detailed information about credit cards or other bank information from the victim.

The scammer, known as Phisher, uses social engineering techniques, posing as a trusted person or company in an apparent official electronic communication, usually an email, or some instant messaging system, social networks SMS/MMS, as a result of malware or even using telephone calls. Most Phishing attacks begin with the reception of an email or a direct message in which the sender is passed through a bank, a company or other real organization in order to deceive the recipient to the recipient. This email includes links to a website prepared by criminals – which imitates that of the legitimate company – and in which the victim is invited to enter their personal data.

In this sense there is a link between spam and phishing, since fraudulent emails are usually sent massively to multiply the number of potential victims of hackers. In fact, although the e-mail continues to be the most used means by cybercriminals for this type of fraud, phishing can use other media in addition: attempts are frequent via SMS (sometimes called Smishing), Voip (Vishing) or instant messages on social networks.

In addition, criminals use certain social engineering tricks to create alarm in messages, with urgent, alarm indications and different calls to action. The idea is that the user immediately acts at the stimulus and does not stop to analyze the risks of their action. (Panda Security)


In a globalized world technology is the medium that allows us to be connected and have work tools that usually make work simpleThey allow third parties to make fraud and steal information.

You can protect your personal information and avoid fraud, phishing attacks or protect your documents by knowing information from the means of protection that exist in addition to knowing these topics and how to identify them.


  • ConsumerFTC. (2013). Obtained from https: // www.consumer.FTC.GOV/Topics/Security-in-L%C3%Adnea
  • DEFINITION. (2015). Obtained from https: //
  • Panda Security. (2018). Obtained from https: //
  • UNAM Magazine. (2017). Obtained from https: //
  • Sivytec. (Accessed in 2020). Obtained from https: //
  • Techlandia. (2017). Obtained from https: //
  • Obtained from https: //
  • Obtained from https: //

Free Importance Of Electronic Security In Today’S World Essay Sample

Related samples

Zika virus: Transmission form Introduction The Zika virus belongs to the Flaviviradae family, was found for the first time in a monkey called Rhesus febrile and in...

Zika virus: cases and prevention Introduction The World Health Organization (WHO) has confirmed that Zika is a virus caused through the mosquito bite which is...

Zeus The King of Greek mythology Introduction Zeus is the Olympic God of heaven and thunder, the king of all other gods and men and, consequently, the main figure...

Zeus's punishment to Prometheus Introduction Prometheus, punished by Zeus Prometheus, punished by Zeus. Prometheus is a ‘cousin’ of Zeus. He is the son of the...


Leave feedback

Your email address will not be published. Required fields are marked *