Your SlideShare is downloading. ×
System Security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

System Security

283
views

Published on

Published in: Technology, News & Politics

0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
283
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. System Security
    What is it?
    It is concerned with taking care of hardware, software and most importantly data.
  • 2. Physical
    software
    Types of security
  • 3. Computers can be protected from:
    Computer theft
    Fires
    Dust
    Extreme temperature
    Voice printsA person speaks into a microphone and the computer analyses the voice. If it belongs to an authorized person, the computer allows entry to a room or allows access to a computer.
    Physical security
  • 4. Identity CardsIn order to gain access to a room or a computer, a person may have to swipe an identity card through a card reader.
    Cont…….
  • 5. Viruses
    Disk failure
    hacking
    Software hazards
  • 6. Software security
    Installing anti viruses
    Taking precautions to avoid viruses during transfer of data such as buying pirated software CDs, used USBs, installing and use of free ware should be avoided.
    Data Encryption
    i-e The data may be encrypted (coded) into a form which can only then be decoded by the intended user. If the data falls into the wrong hands it will be meaningless.
  • 7. Backing up data on regular basis.
    Creating transaction logs
    A record of all transactions made by a business since the last backup was made. 
    Cont….
  • 8. Some other software methods of Data Security

×