3.2.2 security measures


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

3.2.2 security measures

  1. 1. 4.0 COMPUTER ETHICS AND SECURITY 4.2 Computer Security 4.2.2 Security Measures
  2. 2. LEARNING OUTCOMES: At the end of this topic, students should be able to:  Identify different ways to overcome security risks. 2
  3. 3. Security Measures Anti-virus Anti-spywareCryptography Firewall Data Security Humanbackup Measures aspect: awareness
  4. 4. 1.Anti-virusA software use to protect computers againstviruses by identifying and removing anycomputer virus found in memory, on storagemedia, or in incoming files.Example: • McAfee VirusScan • Norton AntiVirus • AVG Anti-Virus • avast! AntivirusMost anti-virus program also protect againstother malware.
  5. 5. 2.Anti-spywarePrograms that detect and deletes spywareExample :  Ad-Aware  Spy Sweeper  Windows Defender
  6. 6. 3.Firewall• A firewall is hardware and/or software that protects a network’s resources from intrusion Hardware firewall is a built-in feature in routers that prevents unauthorized users from accessing files and computers in a network.
  7. 7. Firewall
  8. 8. Firewall
  9. 9. 4. Data backup• A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed – To back up a file means to make a copy of it• Offsite backups are stored in a location separate from the computer site Cloud Storage
  10. 10. Data backup• Two categories of • In the case of system backups: failure, you can – Full backup – copies restore the file by all the files in the copying the backed computer up files to their – Selective backup – original location on choose which folder the computer. and files to include in backup
  11. 11. 5.CryptographyThe art of protecting information by transformingit (encrypting it) into an unreadable formatTechnology of encoding information so it canonly be read by authorized individuals Encryption Process of converting readable data into unreadable characters to prevent unauthorized access. Decryption Process to decode encrypted data
  12. 12. Cryptography
  13. 13. CryptographyHow ?To read the data, you must decrypt it into readableform.The unencrypted data is called plain text.The encrypted data is called cipher text.To encrypt, plain text converted into cipher text usingan encryption key.Importance ?The process of proving ones identity.Ensuring that no one can read the message except theintended receiver.
  14. 14. 6.Human Aspects: Awareness Expose employees or staff to computer security Make a routine check to update from new virus, worm or other malicious threat. Proper handling of computer and information
  15. 15. Computer Security aComputer Security Risk Security Measure Internet and network attack Anti-virus Anti-spyware Firewall Human Aspect-Awareness Unauthorized access and use Firewall Human Aspect-Awareness Hardware theft Data backup Human Aspect-Awareness Software theft Data backup Human Aspect-Awareness Information theft Data backup Cryptography Human Aspect-Awareness System failure Data backup Human Aspect-Awareness