Your SlideShare is downloading. ×
Methods
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Methods

157

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
157
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. METHODS USE TO ENHANCETHE VALUE
  • 2. Either way, organisations cannotfunction without accurate information,and they do not want unauthorized peoplegetting into the system and changinginformation .In addition, much of this data is used inthe organisations decision making andproblem solving .
  • 3. Organizations need to secure not onlytheir data but also the systems on which thedata is stored.They need protection from naturaldisasters acts of sabotage, theft andunlawful access.
  • 4. ACCESSCONTROL
  • 5. Organisations generally protect theirhardware and software by restricting accessto the areas in which the computer itself.This is sometimes done by means of doorsthat cannot be opened without a PIN, thisnumber being known only by certain people.
  • 6. Encryption Is the transforming of normal text, which can be read by all, into something that requires a code or decryption key.
  • 7. Symmetric encryption  Is the traditional encryption method and relies on both the sender and the receiver of a message knowing the key.  How ever, if a key is used by two people who are considerable distance apart, then at some stage the key must be transmitted to the receiver.
  • 8. Asymmetric or public keyencryption of encryption uses different  This kind keys to encrypt and decrypt.  This system gives all users a public key that all know and can use and a private key that is secret.  A message is encrypted using the public key and the private key is used to decrypt the message.  At no point is the private key
  • 9. PASSWORD  Most organization use a password system that requires a user to enter a name and password to log on the system.  This system of identification and access control is also adopted in networks giving each user different privileges.  Passwords can also be used on
  • 10. ACCESS CARDS  By using swipe cards and proximity cards, employees can gain access to buildings and specialized areas, depending on the privileges allowed by that card.
  • 11. ACTIVE BADGES  Active badges restrict access by tracking an employee’s location using their badge.  Employees and their whereabouts can be monitored by a central system that knows where they are at any given time.
  • 12. FIREWALLS  Are type of software designed to protect files and data from unauthorized, external access of a network through the internet.  Firewalls have a range of features, including access control through passwords and encryption, and a log that records all unauthorized access
  • 13. BIOMETRICS Refers to the automatic identification of a person based on a certain physiological or behavioral characteristics. This method is growing in popularity over the above methods because the person to be identified is required to be physically present at the point of
  • 14.  By replacing PIN’s and passwords with biometrics techniques, the risk of unauthorized access and fraudulent use is decreased. Biometric identification can be applied to a range of technology, such as ATM’s’ mobile phone phones, smart cards and desktop computers.
  • 15. AN AUTOMATED BIOMETRIC DEVICE HAS THREE MAJOR
  • 16. 1.A mechanism to scan and capture an image of the characteristics2. compression, processing and comparison of the image3. an interface with application system
  • 17. OTHERBIOMETRICMETHODS:
  • 18.  voice- matches the sound patterns of someone speaking their name or passwords to those file. facial identification- converts a facial image on video to a digital one and compares it with one on file. fingerprints- compares the ridges on fingers with those in a central database. palm prints- compares the ridges on a
  • 19.  hand veins- scans the vein pattern on the back on the hand handwriting acoustic emissions- analyses sounds generated with someone signs their name iris- a video image of the coloured part of the eye is mapped by the computer and each person is given an individual code based on their iris
  • 20. The end!!!!Presented by: Mary Jesette E. Penaojas BLIS-III Presented to: Mrs. Sheryl C. Farquerabao

×