METHODS  USE TO ENHANCETHE VALUE
Either way, organisations cannotfunction without accurate information,and they do not want unauthorized peoplegetting int...
Organizations need to secure not onlytheir data but also the systems on which thedata is stored.They need protection fro...
ACCESSCONTROL
Organisations generally protect theirhardware and software by restricting accessto the areas in which the computer itself...
Encryption  Is the transforming of normal text,  which can be read by all, into  something that requires a code or  decryp...
Symmetric encryption  Is the traditional encryption method   and relies on both the sender and the   receiver of a messag...
Asymmetric or public keyencryption of encryption uses different  This kind   keys to encrypt and decrypt.  This system g...
PASSWORD  Most organization use a password   system that requires a user to enter   a name and password to log on the   s...
ACCESS CARDS  By using swipe cards and   proximity cards, employees can   gain access to buildings and   specialized area...
ACTIVE BADGES  Active badges restrict access by   tracking an employee’s location   using their badge.  Employees and th...
FIREWALLS  Are type of software designed to   protect files and data from   unauthorized, external access of a   network ...
BIOMETRICS Refers to the automatic identification  of a person based on a certain  physiological        or     behavioral...
 By replacing PIN’s and passwords with  biometrics techniques, the risk of  unauthorized access and fraudulent use  is de...
AN AUTOMATED  BIOMETRIC  DEVICE HAS THREE MAJOR
1.A mechanism to scan and capture an  image of the characteristics2. compression,       processing      and  comparison of...
OTHERBIOMETRICMETHODS:
 voice- matches the sound patterns of someone speaking their name or passwords to those file. facial identification- con...
 hand veins- scans the vein pattern on the back on the hand handwriting    acoustic emissions- analyses sounds generated...
The end!!!!Presented by:         Mary Jesette E. Penaojas         BLIS-III                                    Presented to...
Methods
Methods
Methods
Methods
Upcoming SlideShare
Loading in …5
×

Methods

183
-1

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
183
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Methods

  1. 1. METHODS USE TO ENHANCETHE VALUE
  2. 2. Either way, organisations cannotfunction without accurate information,and they do not want unauthorized peoplegetting into the system and changinginformation .In addition, much of this data is used inthe organisations decision making andproblem solving .
  3. 3. Organizations need to secure not onlytheir data but also the systems on which thedata is stored.They need protection from naturaldisasters acts of sabotage, theft andunlawful access.
  4. 4. ACCESSCONTROL
  5. 5. Organisations generally protect theirhardware and software by restricting accessto the areas in which the computer itself.This is sometimes done by means of doorsthat cannot be opened without a PIN, thisnumber being known only by certain people.
  6. 6. Encryption Is the transforming of normal text, which can be read by all, into something that requires a code or decryption key.
  7. 7. Symmetric encryption  Is the traditional encryption method and relies on both the sender and the receiver of a message knowing the key.  How ever, if a key is used by two people who are considerable distance apart, then at some stage the key must be transmitted to the receiver.
  8. 8. Asymmetric or public keyencryption of encryption uses different  This kind keys to encrypt and decrypt.  This system gives all users a public key that all know and can use and a private key that is secret.  A message is encrypted using the public key and the private key is used to decrypt the message.  At no point is the private key
  9. 9. PASSWORD  Most organization use a password system that requires a user to enter a name and password to log on the system.  This system of identification and access control is also adopted in networks giving each user different privileges.  Passwords can also be used on
  10. 10. ACCESS CARDS  By using swipe cards and proximity cards, employees can gain access to buildings and specialized areas, depending on the privileges allowed by that card.
  11. 11. ACTIVE BADGES  Active badges restrict access by tracking an employee’s location using their badge.  Employees and their whereabouts can be monitored by a central system that knows where they are at any given time.
  12. 12. FIREWALLS  Are type of software designed to protect files and data from unauthorized, external access of a network through the internet.  Firewalls have a range of features, including access control through passwords and encryption, and a log that records all unauthorized access
  13. 13. BIOMETRICS Refers to the automatic identification of a person based on a certain physiological or behavioral characteristics. This method is growing in popularity over the above methods because the person to be identified is required to be physically present at the point of
  14. 14.  By replacing PIN’s and passwords with biometrics techniques, the risk of unauthorized access and fraudulent use is decreased. Biometric identification can be applied to a range of technology, such as ATM’s’ mobile phone phones, smart cards and desktop computers.
  15. 15. AN AUTOMATED BIOMETRIC DEVICE HAS THREE MAJOR
  16. 16. 1.A mechanism to scan and capture an image of the characteristics2. compression, processing and comparison of the image3. an interface with application system
  17. 17. OTHERBIOMETRICMETHODS:
  18. 18.  voice- matches the sound patterns of someone speaking their name or passwords to those file. facial identification- converts a facial image on video to a digital one and compares it with one on file. fingerprints- compares the ridges on fingers with those in a central database. palm prints- compares the ridges on a
  19. 19.  hand veins- scans the vein pattern on the back on the hand handwriting acoustic emissions- analyses sounds generated with someone signs their name iris- a video image of the coloured part of the eye is mapped by the computer and each person is given an individual code based on their iris
  20. 20. The end!!!!Presented by: Mary Jesette E. Penaojas BLIS-III Presented to: Mrs. Sheryl C. Farquerabao
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×