Proceeding of

NCAICN National Conference 2013



Advances in

Computing & Networking


A Special Issue of

International Journal of Computer Science and Applications



Hon. Shri Sundeepji Meghe

(Chairman, Vidarbha Youth Welfare Society, Amravati)



Dr. V.T. Ingole (FIE, FIETE, Professor Emeritus)


Organizing Committee


Dr. D.T. Ingole (FIE, FIETE)

(Principal PRMIT & R, Badnera and  Chairman IEI  Amravati Center).


 Er. A.W. Jawanjal

(Honorary Secretary IEI, Amravati Center)


Dr. G.R. Bamnote ((FIE, FIETE)

(H.O.D. Computer Science & Engineering)

Dr. A.S. Alvi (MIE)

(H.O.D. Information Technology))

Prof. Mrs. M.D. Ingole (FIE.MIETE)

(H.O.D. Electronics & Telecommunication)


Prof. S.V. Dhopte ((FIE, FIETE)

Prof. Ms. V.M. Deshmukh (FIE, FIETE)

Dr. S.W. Mohod  (FIE,FIETE)


Dr. S.R. Gupta (MIE, MIETE)

Prof. S.V. Pattalwar ((FIE, FIETE)

Prof. M.D. Damahe


Prof. Mrs. M.S. Joshi                

Dr. S.M. Deshmukh

Prof. V.U. Kale

Prof. S.S. Kulkarni

Prof. Ms. R.R. Tuteja

Prof. Ms. J.N. Ingole

Prof. V.R. Raut

Prof. C.N. Deshmukh

Prof. Ms. M.S. Deshmukh

Prof. S.P. Akarte

Prof. Mrs. A.P. Deshmukh

Prof. Mrs. S.S. Sikchi

Prof. N.N. Khalsa

Department of Information and Computer Science and Engineering

Prof. Ram Meghe Institute of Technology and Research, Badnera Distt. Amravati



Prof. K. H. Walse





IJCSA ISSN: 0974-1011 (Online) >>    

Security Issues Facing Computer Users: An Overview

Ms. Yugandhara V. Dhepe and Prof. S. P. Akarte


This paper is a broad overview of several issues pertaining to computer security. There are two types of computer security one is standalone computer security means security of computer when it is not connected with network and second is security of computer when it is connected with network. Using Biometrics methods the computer user can allow only authentication logins. And by using encryption technique the computer users can secure the data in the computer system. With the help of the firewall the computer user can control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. The overall aim of this paper is to discuss here the security issues facing computer user and methods to secure computer system.

2013 International Journal of Computer Science and Applications 

Published by Research Publications, India