Computer securit ycompilation


Published on


Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Computer securit ycompilation

  2. 2. The objective of computer security includes protection of information andproperty from• Theft• Corruption• Natural disasterwhile allowing the information andpropertyto remain accessible and productive toits intended users
  3. 3. AppArmor("Application Armor") is a securitymodule for the Linux kernel, releasedunder the GNU General Public License.AppArmor allows the systemadministrator to associate with eachprogram a security profile thatrestricts the capabilities of thatprogram.
  4. 4. Computer Security Win 8 Microsoft is looking to bypass what hacker Kevin Mitnick has called the weakest link of computer security able to store any passwords you create, then sync them across all other trusted Windows 8 machines Microsoft is also taking security a step further for business users by helping simplify the dedicated hardware requirement for public/private key encryption, a more secure version of credentials exchange
  5. 5. VISTA is an operating system released in several variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs.
  6. 6. Security & Safety BitLocker Drive Encryption is a security feature that provides better data protection for your computer by encrypting all data stored on the Windows operating system volume. Encrypting File System, available in Business, Enterprise, and Ultimate editions of Windows Vista, is useful for user-level file and folder encryption.
  7. 7. Security & Safety The parental controls built into Windows Vista help parents determine which games their children can play, which programs they can use, and which websites they can visit—and when. Shadow copy is automatically turned on in Windows Vista and creates copies, on a scheduled basis, of files that have changed. Since only incremental changes are saved, minimal disk space is used for shadow copies.
  8. 8. What is iOS? iOS (formerly iPhone OS) is Apple Inc.s mobile operating system. Originally developed for the iPhone, it has since been extended to support other Apple, Inc. devices such as the iPod Touch, iPad, and Apple TV. Apple, Inc. does not license iOS for installation on non- Apple hardware.
  9. 9. • Microsoft Security Essentials• Windows Defender
  10. 10. Android Security for Antivirus and Loss Protection• Lookout Mobile Security A free account lets you scan your phone for malware, back up and restore your data online, and use GPS to locate your phone should it ever get lost or stolen.• Norton Mobile Security allows remotely locks and wipes your phone by text message. It can also lock down the SIM card.
  11. 11. What is the Security Features iOS? Geo location - If you lose your iPhone this feature is very handy. Auto erase - you can remotely ask Apple to erase the data on your device. Data encryption - iOS can encrypt your confidential corporate data. 4 layers of OS - iOS apps cannot directly access the underlying hardware.
  12. 12. terminologies of securityTERMINOLOGY MEANINGAuthentication techniques can be used to ensure that communication end-points are who they say they are.Firewalls can provide some protection from online intrusion.Anti-virus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious softwareBackups are a way of securing informationEncryption is used to protect the message from the eyes of others.Pinging The ping application can be used by potential crackers to find if an IP address is reachable. If a cracker finds a computer, they can try a port scan to detect and attack services on that computer.