1.Anti-virusA software use to protect computers againstviruses by identifying and removing anycomputer virus found in memory, on storagemedia, or in incoming files.Example: • McAfee VirusScan • Norton AntiVirus • AVG Anti-Virus • avast! AntivirusMost anti-virus program also protect againstother malware.
2.Anti-spywarePrograms that detect and deletes spywareExample : Ad-Aware Spy Sweeper Windows Defender
3.Firewall• A firewall is hardware and/or software that protects a network’s resources from intrusion Hardware firewall is a built-in feature in routers that prevents unauthorized users from accessing files and computers in a network.
4. Data backup• A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed – To back up a file means to make a copy of it• Offsite backups are stored in a location separate from the computer site Cloud Storage
Data backup• Two categories of • In the case of system backups: failure, you can – Full backup – copies restore the file by all the files in the copying the backed computer up files to their – Selective backup – original location on choose which folder the computer. and files to include in backup
5.CryptographyThe art of protecting information by transformingit (encrypting it) into an unreadable formatTechnology of encoding information so it canonly be read by authorized individuals Encryption Process of converting readable data into unreadable characters to prevent unauthorized access. Decryption Process to decode encrypted data
CryptographyHow ?To read the data, you must decrypt it into readableform.The unencrypted data is called plain text.The encrypted data is called cipher text.To encrypt, plain text converted into cipher text usingan encryption key.Importance ?The process of proving ones identity.Ensuring that no one can read the message except theintended receiver.
6.Human Aspects: Awareness Expose employees or staff to computer security Make a routine check to update from new virus, worm or other malicious threat. Proper handling of computer and information
Computer Security aComputer Security Risk Security Measure Internet and network attack Anti-virus Anti-spyware Firewall Human Aspect-Awareness Unauthorized access and use Firewall Human Aspect-Awareness Hardware theft Data backup Human Aspect-Awareness Software theft Data backup Human Aspect-Awareness Information theft Data backup Cryptography Human Aspect-Awareness System failure Data backup Human Aspect-Awareness