Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this


  2. 2. Either way, organisations cannotfunction without accurate information,and they do not want unauthorized peoplegetting into the system and changinginformation .In addition, much of this data is used inthe organisations decision making andproblem solving .
  3. 3. Organizations need to secure not onlytheir data but also the systems on which thedata is stored.They need protection from naturaldisasters acts of sabotage, theft andunlawful access.
  5. 5. Organisations generally protect theirhardware and software by restricting accessto the areas in which the computer itself.This is sometimes done by means of doorsthat cannot be opened without a PIN, thisnumber being known only by certain people.
  6. 6. Encryption Is the transforming of normal text, which can be read by all, into something that requires a code or decryption key.
  7. 7. Symmetric encryption  Is the traditional encryption method and relies on both the sender and the receiver of a message knowing the key.  How ever, if a key is used by two people who are considerable distance apart, then at some stage the key must be transmitted to the receiver.
  8. 8. Asymmetric or public keyencryption of encryption uses different  This kind keys to encrypt and decrypt.  This system gives all users a public key that all know and can use and a private key that is secret.  A message is encrypted using the public key and the private key is used to decrypt the message.  At no point is the private key
  9. 9. PASSWORD  Most organization use a password system that requires a user to enter a name and password to log on the system.  This system of identification and access control is also adopted in networks giving each user different privileges.  Passwords can also be used on
  10. 10. ACCESS CARDS  By using swipe cards and proximity cards, employees can gain access to buildings and specialized areas, depending on the privileges allowed by that card.
  11. 11. ACTIVE BADGES  Active badges restrict access by tracking an employee’s location using their badge.  Employees and their whereabouts can be monitored by a central system that knows where they are at any given time.
  12. 12. FIREWALLS  Are type of software designed to protect files and data from unauthorized, external access of a network through the internet.  Firewalls have a range of features, including access control through passwords and encryption, and a log that records all unauthorized access
  13. 13. BIOMETRICS Refers to the automatic identification of a person based on a certain physiological or behavioral characteristics. This method is growing in popularity over the above methods because the person to be identified is required to be physically present at the point of
  14. 14.  By replacing PIN’s and passwords with biometrics techniques, the risk of unauthorized access and fraudulent use is decreased. Biometric identification can be applied to a range of technology, such as ATM’s’ mobile phone phones, smart cards and desktop computers.
  16. 16. 1.A mechanism to scan and capture an image of the characteristics2. compression, processing and comparison of the image3. an interface with application system
  18. 18.  voice- matches the sound patterns of someone speaking their name or passwords to those file. facial identification- converts a facial image on video to a digital one and compares it with one on file. fingerprints- compares the ridges on fingers with those in a central database. palm prints- compares the ridges on a
  19. 19.  hand veins- scans the vein pattern on the back on the hand handwriting acoustic emissions- analyses sounds generated with someone signs their name iris- a video image of the coloured part of the eye is mapped by the computer and each person is given an individual code based on their iris
  20. 20. The end!!!!Presented by: Mary Jesette E. Penaojas BLIS-III Presented to: Mrs. Sheryl C. Farquerabao