SlideShare a Scribd company logo
1 of 5
Download to read offline
Wednesbury Business Solution



                Abraham Bautista
Task 5 – Document and Computer Security
 Introduction – In this PowerPoint I will talk about how to
  protect documents from getting hacked or damaged and
  how to secure your computer.
Back up
 Back up is a process of copying data so that in case you lose your files you
  can use your back up to restore it. The purpose of back up is that if you
  accidentally delete an important data, or if your files has been corrupted
  you can still get it back. Backing up files is important as 67% of people using
  the internet suffer data loss.
 There are many different ways you can back up your data by using magnetic
  data, hard disk, optical storage (discs), floppy disk, solid state storage (USB
  flash drives), and remote backup service (backing up via internet).
 The importance of backing up is not only restoring files that are lost, it can
  also be an evidence that a certain documents belongs to you.
Data Compression
 Data compression is a technique for eliminating coarse-grained redundant data,
  typically to improve storage utilization. Compression is useful because it helps
  reduce the consumption of expensive resources, such as hard disk space or
  transmission bandwidth.
 The downside of data compression is that you have to decompress the
  compressed data to use and can take time with different applications. E.g. A
  compressed video would need an expensive hardware for the video to be
  decompressed fast enough to be viewed as it is being decompressed.
 Lossy image compression is used in digital cameras, to increase storage
  capacities with minimal degradation of picture quality. Similarly, DVDs use the
  lossy MPEG-2 Video codec for video compression.
 The Lempel-Ziv (LZ) compression methods are among the most popular
  algorithms for lossless storage. DEFLATE is a variation on LZ which is optimized
  for decompression speed and compression ratio, therefore compression can be
  slow. DEFLATE is used in PKZIP, gzip and PNG. LZW (Lempel-Ziv-Welch) is used in
  GIF images. Also noteworthy are the LZR methods, which serve as the basis of
  the Zip method.
Encryption
 Encryption is the process of transforming information using an algorithm
  called cipher, to make it unreadable to anyone except those possessing
  special knowledge, which is known as a key. The result of the process is
  encrypted information.
 In many contexts, the word encryption also refers to the reverse process,
  decryption. Encryption software can also perform decryption to make the
  encrypted information readable again (i.e. to make it unencrypted).
 The computer security reported that 71% of companies surveyed utilized
  encryption for some of their data in transit, and 53% utilized encryption for
  some of their data in storage.
 Encryption can be used to protect data "at rest", such as files on computers
  and storage devices (e.g. USB flash drives). As there are numerous of reports
  that confidential files are being lost or stolen, encryption can help protect
  files so that they cannot be stolen.

More Related Content

What's hot

How to take care of computers and secondary storage media
How to take care of computers and secondary storage mediaHow to take care of computers and secondary storage media
How to take care of computers and secondary storage mediaJojo Carrillo
 
Securing data
Securing dataSecuring data
Securing dataDaniel Le
 
Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage deviceMohit Shah
 

What's hot (6)

How to take care of computers and secondary storage media
How to take care of computers and secondary storage mediaHow to take care of computers and secondary storage media
How to take care of computers and secondary storage media
 
storage devices
storage devicesstorage devices
storage devices
 
Securing data
Securing dataSecuring data
Securing data
 
Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
 
Tape rotation PPT
Tape rotation PPTTape rotation PPT
Tape rotation PPT
 
Backup strategy plan
Backup strategy planBackup strategy plan
Backup strategy plan
 

Viewers also liked

Lessons Learned From Putting Linux on System z in Production
Lessons Learned From Putting Linux on System z in ProductionLessons Learned From Putting Linux on System z in Production
Lessons Learned From Putting Linux on System z in ProductionIBM India Smarter Computing
 
Optimizing WordPress for Speed and Conversions
Optimizing WordPress for Speed and ConversionsOptimizing WordPress for Speed and Conversions
Optimizing WordPress for Speed and ConversionsAffiliate Summit
 
Patient care safety pedi 4 & 7 voice over
Patient care safety pedi 4 & 7 voice over Patient care safety pedi 4 & 7 voice over
Patient care safety pedi 4 & 7 voice over Tiffani Walker
 
walgreen Finance Committee Charter
 walgreen Finance Committee Charter walgreen Finance Committee Charter
walgreen Finance Committee Charterfinance4
 
The controversy around apartheid
The controversy around apartheidThe controversy around apartheid
The controversy around apartheidRaymond van Diemel
 
Back injury prevention program mod1
Back injury prevention program mod1Back injury prevention program mod1
Back injury prevention program mod1larch1977
 
Cakephp2study tips集
Cakephp2study tips集Cakephp2study tips集
Cakephp2study tips集Kohji Tanaka
 
Mccpta reflections spring training 2013
Mccpta reflections spring training 2013Mccpta reflections spring training 2013
Mccpta reflections spring training 2013Melissa McDonald
 
Plataformas Eureka - Crowdfunding
Plataformas Eureka - CrowdfundingPlataformas Eureka - Crowdfunding
Plataformas Eureka - CrowdfundingFrancesc Hinojosa
 
Jarrar: OWL -Web Ontology Language
Jarrar: OWL -Web Ontology LanguageJarrar: OWL -Web Ontology Language
Jarrar: OWL -Web Ontology LanguageMustafa Jarrar
 
Buffering Vulnerable Careers Against Corporate Pedophiles (Shielding Blossomi...
Buffering Vulnerable Careers Against Corporate Pedophiles (Shielding Blossomi...Buffering Vulnerable Careers Against Corporate Pedophiles (Shielding Blossomi...
Buffering Vulnerable Careers Against Corporate Pedophiles (Shielding Blossomi...Murad Salman Mirza
 
EUGM 2013 - Miklos Szabo (ChemAxon) - Recent Successful Discovery Strategies ...
EUGM 2013 - Miklos Szabo (ChemAxon) - Recent Successful Discovery Strategies ...EUGM 2013 - Miklos Szabo (ChemAxon) - Recent Successful Discovery Strategies ...
EUGM 2013 - Miklos Szabo (ChemAxon) - Recent Successful Discovery Strategies ...ChemAxon
 
The GP 2.8 Game - – Deploying a Balanced Measurement Plan by the ‘Play’n’Lear...
The GP 2.8 Game - – Deploying a Balanced Measurement Plan by the ‘Play’n’Lear...The GP 2.8 Game - – Deploying a Balanced Measurement Plan by the ‘Play’n’Lear...
The GP 2.8 Game - – Deploying a Balanced Measurement Plan by the ‘Play’n’Lear...Luigi Buglione
 
Tg 5 Ahti Allikas Cen 18 06 2009
Tg 5 Ahti Allikas Cen 18 06 2009Tg 5 Ahti Allikas Cen 18 06 2009
Tg 5 Ahti Allikas Cen 18 06 2009Friso de Jong
 

Viewers also liked (20)

Lessons Learned From Putting Linux on System z in Production
Lessons Learned From Putting Linux on System z in ProductionLessons Learned From Putting Linux on System z in Production
Lessons Learned From Putting Linux on System z in Production
 
Optimizing WordPress for Speed and Conversions
Optimizing WordPress for Speed and ConversionsOptimizing WordPress for Speed and Conversions
Optimizing WordPress for Speed and Conversions
 
Patient care safety pedi 4 & 7 voice over
Patient care safety pedi 4 & 7 voice over Patient care safety pedi 4 & 7 voice over
Patient care safety pedi 4 & 7 voice over
 
walgreen Finance Committee Charter
 walgreen Finance Committee Charter walgreen Finance Committee Charter
walgreen Finance Committee Charter
 
The controversy around apartheid
The controversy around apartheidThe controversy around apartheid
The controversy around apartheid
 
Back injury prevention program mod1
Back injury prevention program mod1Back injury prevention program mod1
Back injury prevention program mod1
 
Cakephp2study tips集
Cakephp2study tips集Cakephp2study tips集
Cakephp2study tips集
 
Mccpta reflections spring training 2013
Mccpta reflections spring training 2013Mccpta reflections spring training 2013
Mccpta reflections spring training 2013
 
F3 new consumer
F3 new consumerF3 new consumer
F3 new consumer
 
Fixed Fields
Fixed FieldsFixed Fields
Fixed Fields
 
Questionnaire
QuestionnaireQuestionnaire
Questionnaire
 
Mobile apps1
Mobile apps1Mobile apps1
Mobile apps1
 
Plataformas Eureka - Crowdfunding
Plataformas Eureka - CrowdfundingPlataformas Eureka - Crowdfunding
Plataformas Eureka - Crowdfunding
 
Bees
BeesBees
Bees
 
Jarrar: OWL -Web Ontology Language
Jarrar: OWL -Web Ontology LanguageJarrar: OWL -Web Ontology Language
Jarrar: OWL -Web Ontology Language
 
Buffering Vulnerable Careers Against Corporate Pedophiles (Shielding Blossomi...
Buffering Vulnerable Careers Against Corporate Pedophiles (Shielding Blossomi...Buffering Vulnerable Careers Against Corporate Pedophiles (Shielding Blossomi...
Buffering Vulnerable Careers Against Corporate Pedophiles (Shielding Blossomi...
 
EUGM 2013 - Miklos Szabo (ChemAxon) - Recent Successful Discovery Strategies ...
EUGM 2013 - Miklos Szabo (ChemAxon) - Recent Successful Discovery Strategies ...EUGM 2013 - Miklos Szabo (ChemAxon) - Recent Successful Discovery Strategies ...
EUGM 2013 - Miklos Szabo (ChemAxon) - Recent Successful Discovery Strategies ...
 
The GP 2.8 Game - – Deploying a Balanced Measurement Plan by the ‘Play’n’Lear...
The GP 2.8 Game - – Deploying a Balanced Measurement Plan by the ‘Play’n’Lear...The GP 2.8 Game - – Deploying a Balanced Measurement Plan by the ‘Play’n’Lear...
The GP 2.8 Game - – Deploying a Balanced Measurement Plan by the ‘Play’n’Lear...
 
Albarino NYC Restaurant Week Recap
Albarino NYC Restaurant Week RecapAlbarino NYC Restaurant Week Recap
Albarino NYC Restaurant Week Recap
 
Tg 5 Ahti Allikas Cen 18 06 2009
Tg 5 Ahti Allikas Cen 18 06 2009Tg 5 Ahti Allikas Cen 18 06 2009
Tg 5 Ahti Allikas Cen 18 06 2009
 

Similar to Document security

Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6sabtolinux
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryptionRuban Deventhiran
 
Tape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data ExplosionTape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data ExplosionIBM India Smarter Computing
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletionsnehal1010
 
research_data_management.pptx
research_data_management.pptxresearch_data_management.pptx
research_data_management.pptxSanjayPatel767445
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Damir Delija
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdfAshraf Hossain
 
Continuous data protection
Continuous data protectionContinuous data protection
Continuous data protectionssuser1eca7d
 
Image Processing in Android Environment AJCSE
Image Processing in Android Environment AJCSEImage Processing in Android Environment AJCSE
Image Processing in Android Environment AJCSEBRNSSPublicationHubI
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storagePreludedx
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesRevolucion
 

Similar to Document security (20)

Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Multimedia:Multimedia compression
Multimedia:Multimedia compression Multimedia:Multimedia compression
Multimedia:Multimedia compression
 
[IJCT-V3I2P27] Authors: Palwinder Singh
[IJCT-V3I2P27] Authors: Palwinder Singh[IJCT-V3I2P27] Authors: Palwinder Singh
[IJCT-V3I2P27] Authors: Palwinder Singh
 
Sub1584
Sub1584Sub1584
Sub1584
 
Tape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data ExplosionTape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data Explosion
 
2tb hard drives
2tb hard drives2tb hard drives
2tb hard drives
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
 
UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
 
research_data_management.pptx
research_data_management.pptxresearch_data_management.pptx
research_data_management.pptx
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
 
Continuous data protection
Continuous data protectionContinuous data protection
Continuous data protection
 
Image Processing in Android Environment AJCSE
Image Processing in Android Environment AJCSEImage Processing in Android Environment AJCSE
Image Processing in Android Environment AJCSE
 
F1803023843
F1803023843F1803023843
F1803023843
 
Pbl1
Pbl1Pbl1
Pbl1
 
White paper clape
White paper clapeWhite paper clape
White paper clape
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storage
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & Features
 

More from Abraham Bautista

More from Abraham Bautista (12)

Task 6 files security
Task 6 files securityTask 6 files security
Task 6 files security
 
Document security
Document securityDocument security
Document security
 
Dos and donts in emailing research
Dos and donts in emailing researchDos and donts in emailing research
Dos and donts in emailing research
 
Dos and don'ts in emailing complete
Dos and don'ts in emailing completeDos and don'ts in emailing complete
Dos and don'ts in emailing complete
 
Task 4
Task 4Task 4
Task 4
 
Attachments
AttachmentsAttachments
Attachments
 
Task 3 effective communication in business
Task 3   effective communication in businessTask 3   effective communication in business
Task 3 effective communication in business
 
Business report exercise
Business report exerciseBusiness report exercise
Business report exercise
 
Business report exercise
Business report exerciseBusiness report exercise
Business report exercise
 
Business report research
Business report researchBusiness report research
Business report research
 
Task 2 business report
Task 2 business reportTask 2 business report
Task 2 business report
 
Business report
Business reportBusiness report
Business report
 

Document security

  • 1. Wednesbury Business Solution Abraham Bautista
  • 2. Task 5 – Document and Computer Security  Introduction – In this PowerPoint I will talk about how to protect documents from getting hacked or damaged and how to secure your computer.
  • 3. Back up  Back up is a process of copying data so that in case you lose your files you can use your back up to restore it. The purpose of back up is that if you accidentally delete an important data, or if your files has been corrupted you can still get it back. Backing up files is important as 67% of people using the internet suffer data loss.  There are many different ways you can back up your data by using magnetic data, hard disk, optical storage (discs), floppy disk, solid state storage (USB flash drives), and remote backup service (backing up via internet).  The importance of backing up is not only restoring files that are lost, it can also be an evidence that a certain documents belongs to you.
  • 4. Data Compression  Data compression is a technique for eliminating coarse-grained redundant data, typically to improve storage utilization. Compression is useful because it helps reduce the consumption of expensive resources, such as hard disk space or transmission bandwidth.  The downside of data compression is that you have to decompress the compressed data to use and can take time with different applications. E.g. A compressed video would need an expensive hardware for the video to be decompressed fast enough to be viewed as it is being decompressed.  Lossy image compression is used in digital cameras, to increase storage capacities with minimal degradation of picture quality. Similarly, DVDs use the lossy MPEG-2 Video codec for video compression.  The Lempel-Ziv (LZ) compression methods are among the most popular algorithms for lossless storage. DEFLATE is a variation on LZ which is optimized for decompression speed and compression ratio, therefore compression can be slow. DEFLATE is used in PKZIP, gzip and PNG. LZW (Lempel-Ziv-Welch) is used in GIF images. Also noteworthy are the LZR methods, which serve as the basis of the Zip method.
  • 5. Encryption  Encryption is the process of transforming information using an algorithm called cipher, to make it unreadable to anyone except those possessing special knowledge, which is known as a key. The result of the process is encrypted information.  In many contexts, the word encryption also refers to the reverse process, decryption. Encryption software can also perform decryption to make the encrypted information readable again (i.e. to make it unencrypted).  The computer security reported that 71% of companies surveyed utilized encryption for some of their data in transit, and 53% utilized encryption for some of their data in storage.  Encryption can be used to protect data "at rest", such as files on computers and storage devices (e.g. USB flash drives). As there are numerous of reports that confidential files are being lost or stolen, encryption can help protect files so that they cannot be stolen.