By Andrew Ranson
<ul><li>Remembers every key pressed by the computer operator </li></ul><ul><li>Sometimes used for illegal purposes e.g. St...
<ul><li>Checks the networks functionality and analyses network performance and speeds </li></ul><ul><li>Also can check net...
<ul><li>Checks the authentication of the software to make sure the software is legitimate and legal </li></ul><ul><li>If t...
<ul><li>Like network monitoring software only it monitors all current activities on the One system  </li></ul><ul><li>Also...
<ul><li>Converts files and data into a code that is only readable if you have the key to decrypt the code of a high grade ...
<ul><li>Software that prevents the installation of viruses on the computer. </li></ul><ul><li>Viruses can do anything from...
<ul><li>Malware (Malicious Software) is basically a collective term for software that is designed to cause damage to a sys...
<ul><li>Anti-spyware  software prevents the installation of the potentially highly destructive software known as spyware. ...
<ul><li>A Firewall is designed to restrict or allow data transfer over a network </li></ul><ul><li>Firewalls are based on ...
Upcoming SlideShare
Loading in...5
×

Security Software

283

Published on

A concise description of a variet of different security software

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
283
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
21
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Security Software

  1. 1. By Andrew Ranson
  2. 2. <ul><li>Remembers every key pressed by the computer operator </li></ul><ul><li>Sometimes used for illegal purposes e.g. Stealing passwords or encryption keys </li></ul><ul><li>Can be used by organisations to check productivity or for security purposes to see if someone is accessing something they’re not allowed to or if they are installing or downloading viruses on the computers </li></ul>
  3. 3. <ul><li>Checks the networks functionality and analyses network performance and speeds </li></ul><ul><li>Also can check networks for illegal activities completed by users currently connected to and using the network </li></ul>
  4. 4. <ul><li>Checks the authentication of the software to make sure the software is legitimate and legal </li></ul><ul><li>If the software is found to be illegal of illegitimate, the software may become locked and unusable or the software may have restricted functionality and usability </li></ul>
  5. 5. <ul><li>Like network monitoring software only it monitors all current activities on the One system </li></ul><ul><li>Also monitors more technical details such as system temperatures, fan RPM and memory usage. </li></ul>
  6. 6. <ul><li>Converts files and data into a code that is only readable if you have the key to decrypt the code of a high grade decryption program </li></ul><ul><li>Encrypting data prevents it from being read by other people if they do end up getting their hands on it. </li></ul><ul><li>Encryption and Decryption can be long and tedious but is well worth it for security reasons </li></ul>
  7. 7. <ul><li>Software that prevents the installation of viruses on the computer. </li></ul><ul><li>Viruses can do anything from editing a few small files all the way to completely corrupting critical system files and software. </li></ul>
  8. 8. <ul><li>Malware (Malicious Software) is basically a collective term for software that is designed to cause damage to a system </li></ul><ul><li>Malware includes: </li></ul><ul><ul><li>Viruses </li></ul></ul><ul><ul><li>Worms </li></ul></ul><ul><ul><li>Trojan Horses </li></ul></ul><ul><ul><li>Spyware </li></ul></ul><ul><li>Anti-malware software aims to prevent this malicious software from infecting the system </li></ul>
  9. 9. <ul><li>Anti-spyware software prevents the installation of the potentially highly destructive software known as spyware. </li></ul><ul><li>Spyware as the name suggests is used to spy on the programs and tasks used by the system which it has infected </li></ul><ul><li>Spyware can give another system partial control over the system it is installed on and allow them to install other software like viruses on the system </li></ul><ul><li>Spyware can also collect data from the infected system and transfer it to another system. </li></ul>
  10. 10. <ul><li>A Firewall is designed to restrict or allow data transfer over a network </li></ul><ul><li>Firewalls are based on a trust system, where things like Internal Networks have a high trust level and data is allowed to be transferred while the Internet on the other hand has a low trust level and less to no data is permitted to be transferred. </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×