• Like
  • Save
3.2.2 security measures
Upcoming SlideShare
Loading in...5
×
 

3.2.2 security measures

on

  • 1,456 views

 

Statistics

Views

Total Views
1,456
Views on SlideShare
1,456
Embed Views
0

Actions

Likes
0
Downloads
14
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    3.2.2 security measures 3.2.2 security measures Presentation Transcript

    • 4.0 COMPUTER ETHICS AND SECURITY 4.2 Computer Security 4.2.2 Security Measures
    • LEARNING OUTCOMES: At the end of this topic, students should be able to:  Identify different ways to overcome security risks. 2
    • Security Measures Anti-virus Anti-spywareCryptography Firewall Data Security Humanbackup Measures aspect: awareness
    • 1.Anti-virusA software use to protect computers againstviruses by identifying and removing anycomputer virus found in memory, on storagemedia, or in incoming files.Example: • McAfee VirusScan • Norton AntiVirus • AVG Anti-Virus • avast! AntivirusMost anti-virus program also protect againstother malware.
    • 2.Anti-spywarePrograms that detect and deletes spywareExample :  Ad-Aware  Spy Sweeper  Windows Defender
    • 3.Firewall• A firewall is hardware and/or software that protects a network’s resources from intrusion Hardware firewall is a built-in feature in routers that prevents unauthorized users from accessing files and computers in a network.
    • Firewall
    • Firewall
    • 4. Data backup• A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed – To back up a file means to make a copy of it• Offsite backups are stored in a location separate from the computer site Cloud Storage
    • Data backup• Two categories of • In the case of system backups: failure, you can – Full backup – copies restore the file by all the files in the copying the backed computer up files to their – Selective backup – original location on choose which folder the computer. and files to include in backup
    • 5.CryptographyThe art of protecting information by transformingit (encrypting it) into an unreadable formatTechnology of encoding information so it canonly be read by authorized individuals Encryption Process of converting readable data into unreadable characters to prevent unauthorized access. Decryption Process to decode encrypted data
    • Cryptography
    • CryptographyHow ?To read the data, you must decrypt it into readableform.The unencrypted data is called plain text.The encrypted data is called cipher text.To encrypt, plain text converted into cipher text usingan encryption key.Importance ?The process of proving ones identity.Ensuring that no one can read the message except theintended receiver.
    • 6.Human Aspects: Awareness Expose employees or staff to computer security Make a routine check to update from new virus, worm or other malicious threat. Proper handling of computer and information
    • Computer Security aComputer Security Risk Security Measure Internet and network attack Anti-virus Anti-spyware Firewall Human Aspect-Awareness Unauthorized access and use Firewall Human Aspect-Awareness Hardware theft Data backup Human Aspect-Awareness Software theft Data backup Human Aspect-Awareness Information theft Data backup Cryptography Human Aspect-Awareness System failure Data backup Human Aspect-Awareness