Azerbaijan, Baku, Feb. 20 / Trend S.Isayev, T. Jafarov/
Iran has prohibited import of foreign computer security software, Mehr quotes Iran's Information and Communications Technology Minister, Reza Taghipour as saying.
Taghipour stressed that no foreign software for computer security will be imported into the country, adding that Iran will rely on its own software, made by local developers.
He added that domestic security programs have been improving, and Iran will use them, instead of foreign security software, which cannot be trusted.
He also said the The Bonian Daneshpajouhan Institute has about 25 smaller firms that develop domestic security software of various nature, and country will rely on it.
Roughly there are three types of computer security, computer network security, computer system security, and computer information and data security.
Computer Network Security - Computer networks are an integral part of any organization these days, as they facilitate the free flow of data and services to the authorized users. However, such networks also pose a security threat in case the data is classified and confidential, thus making network security a vital necessity. As the data is available only for authorized users, it is possible for hackers to pretend to be one, by providing the correct user name and password.
Computer System Security - The security of computer hardware and its components is also necessary for the overall protection of data. Even if the computer is not plugged into a network, a person can open its cabinet and gain access to the hard disk, which can later be used on some other computer for data theft. If a standalone system contains some important or classified information, it should be kept under constant surveillance. It is also necessary to remember that in case one dissembles his computer hardware, the risk of losing coverage of warranty becomes very high.
Computer Information and Data Security - It is important to avoid data and information loss in case of hard disk crashes. The only solution is to regularly keep backups of all the data on other media such as magnetic tapes, CD-ROM, etc. It is a good practice to store the media off-site and in case of a disk crash, restore the information from the backup media onto the new disk. As the technical constraints are always there, it is better to take regular backups, in order to avoid any loss of information.