Your SlideShare is downloading. ×
0
Physical Security and Digital
Security
MOHAMAD ZAWAWI BIN MAH HASAN
MUHAMMAD AZIZIE BIN MEZELAN
Physical security
Description
 Physical security, as the name implies,
involves protecting your assets and
information from physical access...
Physical security
 Lock Door – one of the easiest way to
prevent those intent to creating problems
physically entering yo...
Physical security
 Biometrics – physical characteristic to
identify the user.(fingerprint, palm, hand
scanner, retina sca...
Physical security
 Key Fobs – are named after the chains that
used to hold pocket watches to clothes.
 RFID Badges – is ...
Physical security
 RSA token – are anything that user must
have on them to access network resources
and are often associa...
Physical security
Physical security
 Retinal – one form of biometric device that
can be used to identify user.
– Matches are made based upo...
Digital Security
Description
Focused on keeping harmful data and
malware out as well as on
authorization and permissions.
Focused on:
• ant...
Why do we need Digital Security?
• Within our society, there
are people who are
dishonest and we
must take
precautions, ju...
Digital Security
Anti-virus Software
 Operation:
 Run in the background at all time
 Update the virus definition to rec...
Digital Security
Anti-virus Software
 Example:
 AVG
 Avira
 Avast
 Eset NOD32
 Panda
Digital Security
FIREWALL
• Device that provides secure connectivity between networks
(internal/external; varying levels o...
Digital Security
FUNCTIONS OF FIREWALL
Restrict incoming and outgoing traffic by IP
address, ports, or users
Block inval...
Digital Security
Antispyware
 Just as antivirus seeks out and stops viruses from
entering and spreading
 Purpose of anti...
Digital Security
User authentication/strong passwords
A strong password is a password that meets the following guidelines:...
Digital Security
Directory permissions
 Can do to improve or change the security of the
directory services deployed.
 Ca...
Thank You
Digital physical security[present]
Upcoming SlideShare
Loading in...5
×

Digital physical security[present]

405

Published on

discuss about computer security.
reference: comptia a+ book.

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
405
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Digital physical security[present]"

  1. 1. Physical Security and Digital Security MOHAMAD ZAWAWI BIN MAH HASAN MUHAMMAD AZIZIE BIN MEZELAN
  2. 2. Physical security
  3. 3. Description  Physical security, as the name implies, involves protecting your assets and information from physical access by unauthorized personnel.  In other words, you’re trying to protect those items that can be seen, touched, and stolen.
  4. 4. Physical security  Lock Door – one of the easiest way to prevent those intent to creating problems physically entering your environment is to lock your doors and keep them out.  Securing physical documents/password/shredding – in high security and government environment, sensitive papers should be either shredded or burned.
  5. 5. Physical security  Biometrics – physical characteristic to identify the user.(fingerprint, palm, hand scanner, retina scanner, and soon, possibly, DNA scanner)  Badges – can be any of form of identification intended to differentiate the holder from everyone else. Eg: name badge or photo ID.
  6. 6. Physical security  Key Fobs – are named after the chains that used to hold pocket watches to clothes.  RFID Badges – is a type of badge or card that give you access to resources, including buildings, parking lots and computer.
  7. 7. Physical security  RSA token – are anything that user must have on them to access network resources and are often associated with devices that enables the user to generate one-time password authenticating their identity.  Privacy Filters – either film or glass add-ons that are placed over a monitor or laptop screen to prevent the data on the screen from being readable when viewed from the sides.
  8. 8. Physical security
  9. 9. Physical security  Retinal – one form of biometric device that can be used to identify user. – Matches are made based upon identification of the blood vessel in an individual retina. – Rather expensive.  Tailgating – refers being so close to someone when they enter a building that you are able to come in right behind them without needing use a key, a card, or any other security device.
  10. 10. Digital Security
  11. 11. Description Focused on keeping harmful data and malware out as well as on authorization and permissions. Focused on: • antivirus software • Firewalls • Antispyware • User authentication/strong passwords • Directory permissions
  12. 12. Why do we need Digital Security? • Within our society, there are people who are dishonest and we must take precautions, just like we do when we lock our doors, to make sure our digital information and equipment are protected!
  13. 13. Digital Security Anti-virus Software  Operation:  Run in the background at all time  Update the virus definition to recognize new malicious software  Signature-based detection involves searching for known patterns of data within executable code  Generic-based signature are being used to detect new virus by looking for malicious code/slight variants of code in file and will be test in sandbox to see if it performs any malicious actions.
  14. 14. Digital Security Anti-virus Software  Example:  AVG  Avira  Avast  Eset NOD32  Panda
  15. 15. Digital Security FIREWALL • Device that provides secure connectivity between networks (internal/external; varying levels of trust) • Used to implement and enforce a security policy for communication between networks • Separate local network from the Internet Trusted hosts and networks Firewall Router Intranet DMZ Demilitarized Zone: publicly accessible servers and networks
  16. 16. Digital Security FUNCTIONS OF FIREWALL Restrict incoming and outgoing traffic by IP address, ports, or users Block invalid packets
  17. 17. Digital Security Antispyware  Just as antivirus seeks out and stops viruses from entering and spreading  Purpose of antispyware software  The OS from Microsoft are the one most affected by spyware, and Microsoft has released Windows Defender and Security Esentials
  18. 18. Digital Security User authentication/strong passwords A strong password is a password that meets the following guidelines: - Be seven or fourteen characters long, due to the way in which encryption works. For obvious reasons, fourteen characters are preferable. - Contain both uppercase and lowercase letters. - Contain numbers. - Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # | < , > . ? / - Contain a symbol in the second, third, fourth, fifth or sixth position (due to the way in which encryption works). - Not resemble any of your previous passwords. - Not be your name, your friend's or family member's name, or your login. - Not be a dictionary word or common name.
  19. 19. Digital Security Directory permissions  Can do to improve or change the security of the directory services deployed.  Can ensure that they don’t become a tool for an attacker bent on compromising organization’s security
  20. 20. Thank You
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×