• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Computer securit ycompilation

Computer securit ycompilation







Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Computer securit ycompilation Computer securit ycompilation Presentation Transcript

    • The objective of computer security includes protection of information andproperty from• Theft• Corruption• Natural disasterwhile allowing the information andpropertyto remain accessible and productive toits intended users
    • AppArmor("Application Armor") is a securitymodule for the Linux kernel, releasedunder the GNU General Public License.AppArmor allows the systemadministrator to associate with eachprogram a security profile thatrestricts the capabilities of thatprogram.
    • Computer Security Win 8 Microsoft is looking to bypass what hacker Kevin Mitnick has called the weakest link of computer security able to store any passwords you create, then sync them across all other trusted Windows 8 machines Microsoft is also taking security a step further for business users by helping simplify the dedicated hardware requirement for public/private key encryption, a more secure version of credentials exchange
    • VISTA is an operating system released in several variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs.
    • Security & Safety BitLocker Drive Encryption is a security feature that provides better data protection for your computer by encrypting all data stored on the Windows operating system volume. Encrypting File System, available in Business, Enterprise, and Ultimate editions of Windows Vista, is useful for user-level file and folder encryption.
    • Security & Safety The parental controls built into Windows Vista help parents determine which games their children can play, which programs they can use, and which websites they can visit—and when. Shadow copy is automatically turned on in Windows Vista and creates copies, on a scheduled basis, of files that have changed. Since only incremental changes are saved, minimal disk space is used for shadow copies.
    • What is iOS? iOS (formerly iPhone OS) is Apple Inc.s mobile operating system. Originally developed for the iPhone, it has since been extended to support other Apple, Inc. devices such as the iPod Touch, iPad, and Apple TV. Apple, Inc. does not license iOS for installation on non- Apple hardware.
    • • Microsoft Security Essentials• Windows Defender
    • Android Security for Antivirus and Loss Protection• Lookout Mobile Security A free account lets you scan your phone for malware, back up and restore your data online, and use GPS to locate your phone should it ever get lost or stolen.• Norton Mobile Security allows remotely locks and wipes your phone by text message. It can also lock down the SIM card.
    • What is the Security Features iOS? Geo location - If you lose your iPhone this feature is very handy. Auto erase - you can remotely ask Apple to erase the data on your device. Data encryption - iOS can encrypt your confidential corporate data. 4 layers of OS - iOS apps cannot directly access the underlying hardware.
    • terminologies of securityTERMINOLOGY MEANINGAuthentication techniques can be used to ensure that communication end-points are who they say they are.Firewalls can provide some protection from online intrusion.Anti-virus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious softwareBackups are a way of securing informationEncryption is used to protect the message from the eyes of others.Pinging The ping application can be used by potential crackers to find if an IP address is reachable. If a cracker finds a computer, they can try a port scan to detect and attack services on that computer.