System Security <br />What is it?<br />It is concerned with taking care of hardware, software and most importantly data.<b...
Physical<br />software<br />Types of security<br />
Computers can be protected from: <br />Computer theft<br />Fires<br />Dust<br />Extreme temperature<br />Voice printsA per...
Identity CardsIn order to gain access to a room or a computer, a person may have to swipe an identity card through a card ...
Viruses <br />Disk failure<br />hacking<br />Software hazards<br />
Software security<br />Installing anti viruses<br />Taking precautions to avoid viruses during transfer of data such as bu...
Backing up data on regular basis.<br />Creating transaction logs<br />A record of all transactions made by a business sinc...
Some other software methods of Data Security<br />
System Security
Upcoming SlideShare
Loading in …5
×

System Security

324
-1

Published on

Published in: Technology, News & Politics
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
324
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

System Security

  1. 1. System Security <br />What is it?<br />It is concerned with taking care of hardware, software and most importantly data.<br />
  2. 2. Physical<br />software<br />Types of security<br />
  3. 3. Computers can be protected from: <br />Computer theft<br />Fires<br />Dust<br />Extreme temperature<br />Voice printsA person speaks into a microphone and the computer analyses the voice. If it belongs to an authorized person, the computer allows entry to a room or allows access to a computer. <br />Physical security<br />
  4. 4. Identity CardsIn order to gain access to a room or a computer, a person may have to swipe an identity card through a card reader. <br />Cont…….<br />
  5. 5. Viruses <br />Disk failure<br />hacking<br />Software hazards<br />
  6. 6. Software security<br />Installing anti viruses<br />Taking precautions to avoid viruses during transfer of data such as buying pirated software CDs, used USBs, installing and use of free ware should be avoided.<br />Data Encryption<br />i-e The data may be encrypted (coded) into a form which can only then be decoded by the intended user. If the data falls into the wrong hands it will be meaningless. <br />
  7. 7. Backing up data on regular basis.<br />Creating transaction logs<br />A record of all transactions made by a business since the last backup was made. <br />Cont….<br />
  8. 8. Some other software methods of Data Security<br />

×