Upcoming SlideShare
Loading in...5







Total Views
Views on SlideShare
Embed Views



1 Embed 1 1



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Methods Methods Presentation Transcript

    • Either way, organisations cannotfunction without accurate information,and they do not want unauthorized peoplegetting into the system and changinginformation .In addition, much of this data is used inthe organisations decision making andproblem solving .
    • Organizations need to secure not onlytheir data but also the systems on which thedata is stored.They need protection from naturaldisasters acts of sabotage, theft andunlawful access.
    • Organisations generally protect theirhardware and software by restricting accessto the areas in which the computer itself.This is sometimes done by means of doorsthat cannot be opened without a PIN, thisnumber being known only by certain people.
    • Encryption Is the transforming of normal text, which can be read by all, into something that requires a code or decryption key.
    • Symmetric encryption  Is the traditional encryption method and relies on both the sender and the receiver of a message knowing the key.  How ever, if a key is used by two people who are considerable distance apart, then at some stage the key must be transmitted to the receiver.
    • Asymmetric or public keyencryption of encryption uses different  This kind keys to encrypt and decrypt.  This system gives all users a public key that all know and can use and a private key that is secret.  A message is encrypted using the public key and the private key is used to decrypt the message.  At no point is the private key
    • PASSWORD  Most organization use a password system that requires a user to enter a name and password to log on the system.  This system of identification and access control is also adopted in networks giving each user different privileges.  Passwords can also be used on
    • ACCESS CARDS  By using swipe cards and proximity cards, employees can gain access to buildings and specialized areas, depending on the privileges allowed by that card.
    • ACTIVE BADGES  Active badges restrict access by tracking an employee’s location using their badge.  Employees and their whereabouts can be monitored by a central system that knows where they are at any given time.
    • FIREWALLS  Are type of software designed to protect files and data from unauthorized, external access of a network through the internet.  Firewalls have a range of features, including access control through passwords and encryption, and a log that records all unauthorized access
    • BIOMETRICS Refers to the automatic identification of a person based on a certain physiological or behavioral characteristics. This method is growing in popularity over the above methods because the person to be identified is required to be physically present at the point of
    •  By replacing PIN’s and passwords with biometrics techniques, the risk of unauthorized access and fraudulent use is decreased. Biometric identification can be applied to a range of technology, such as ATM’s’ mobile phone phones, smart cards and desktop computers.
    • 1.A mechanism to scan and capture an image of the characteristics2. compression, processing and comparison of the image3. an interface with application system
    •  voice- matches the sound patterns of someone speaking their name or passwords to those file. facial identification- converts a facial image on video to a digital one and compares it with one on file. fingerprints- compares the ridges on fingers with those in a central database. palm prints- compares the ridges on a
    •  hand veins- scans the vein pattern on the back on the hand handwriting acoustic emissions- analyses sounds generated with someone signs their name iris- a video image of the coloured part of the eye is mapped by the computer and each person is given an individual code based on their iris
    • The end!!!!Presented by: Mary Jesette E. Penaojas BLIS-III Presented to: Mrs. Sheryl C. Farquerabao