Either way, organisations cannotfunction without accurate information,and they do not want unauthorized peoplegetting into the system and changinginformation .In addition, much of this data is used inthe organisations decision making andproblem solving .
Organizations need to secure not onlytheir data but also the systems on which thedata is stored.They need protection from naturaldisasters acts of sabotage, theft andunlawful access.
Organisations generally protect theirhardware and software by restricting accessto the areas in which the computer itself.This is sometimes done by means of doorsthat cannot be opened without a PIN, thisnumber being known only by certain people.
Encryption Is the transforming of normal text, which can be read by all, into something that requires a code or decryption key.
Symmetric encryption Is the traditional encryption method and relies on both the sender and the receiver of a message knowing the key. How ever, if a key is used by two people who are considerable distance apart, then at some stage the key must be transmitted to the receiver.
Asymmetric or public keyencryption of encryption uses different This kind keys to encrypt and decrypt. This system gives all users a public key that all know and can use and a private key that is secret. A message is encrypted using the public key and the private key is used to decrypt the message. At no point is the private key
PASSWORD Most organization use a password system that requires a user to enter a name and password to log on the system. This system of identification and access control is also adopted in networks giving each user different privileges. Passwords can also be used on
ACCESS CARDS By using swipe cards and proximity cards, employees can gain access to buildings and specialized areas, depending on the privileges allowed by that card.
ACTIVE BADGES Active badges restrict access by tracking an employee’s location using their badge. Employees and their whereabouts can be monitored by a central system that knows where they are at any given time.
FIREWALLS Are type of software designed to protect files and data from unauthorized, external access of a network through the internet. Firewalls have a range of features, including access control through passwords and encryption, and a log that records all unauthorized access
BIOMETRICS Refers to the automatic identification of a person based on a certain physiological or behavioral characteristics. This method is growing in popularity over the above methods because the person to be identified is required to be physically present at the point of
By replacing PIN’s and passwords with biometrics techniques, the risk of unauthorized access and fraudulent use is decreased. Biometric identification can be applied to a range of technology, such as ATM’s’ mobile phone phones, smart cards and desktop computers.
voice- matches the sound patterns of someone speaking their name or passwords to those file. facial identification- converts a facial image on video to a digital one and compares it with one on file. fingerprints- compares the ridges on fingers with those in a central database. palm prints- compares the ridges on a
hand veins- scans the vein pattern on the back on the hand handwriting acoustic emissions- analyses sounds generated with someone signs their name iris- a video image of the coloured part of the eye is mapped by the computer and each person is given an individual code based on their iris
The end!!!!Presented by: Mary Jesette E. Penaojas BLIS-III Presented to: Mrs. Sheryl C. Farquerabao
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.