SlideShare a Scribd company logo
1 of 30
12/3/2019 1
Samina khan
Fazaia Degree College Risalpur
• Chapter 1 More on Number System
• Chapter 2 Working on Word
• Chapter 3 Working with Spreadsheet
• Chapter 4 Problem solving
• Chapter 5 Introduction to programming
• Chapter 6 Programming in GW-BASIC
• Chapter 7 Data verification & validation
• Chapter 8 Data protection & security
• Chapter 9 Applications of computers
• Chapter 11 The future of Technology
• Chapter 12 Creating webpages
12/3/2019
2
CHAPTER 8
What is data protection and security?
• Being connected to the internet involves sharing
a lot of information.
• We disclose our address, bank account number,
and credit card number when we shop online.
• All of this information is personal. It should not
be shown to any unconcerned person.
• Both businesses and users suffer because of
poor information security.
• Your personal data might reveal things that you
would not like to disclose to the general public.
Continued…
• This information can be stolen from a business’s
database. This data can be used to harass
people, commit fraud and engage in other
criminal activities.
• It is important for the businesses to protect
their customers’ data from being stolen or
misused.
Common security issues
• Problem of data security has grown up due to
sharing of information on internet.
• Some of them are internet fraud & viruses.
Data Privacy
• Some information are private and we don’t like to
disclose it to people we don’t know personally.
• Such information include our address, telephone
number, password and bank account number.
• Data privacy involves protecting information and
allowing access to relevant people only.
• Businesses need to keep their customer data
secure and keep password secret or asking you a
secret question.
Identity theft
• Identity thief gain access to a person’s personal
information without his knowledge.
• Such personal information are password,
credit card number, bank account number etc.
• He can use such information to commit crime.
When the police try to trace the criminal, they
end up arresting the person whose identity
was stolen.
Continued…
• Employees who are fired from their jobs might
steal the personal data of customer as a form
of revenge against the company .
• Some thieves might use this information to
purchase items and then charge them to the
original person’s credit card without his
knowledge.
Data Integrity
• Three attributes of data integrity are:
1. Complete
2. Accurate
3. Sensible
Continued…
• When an unauthorized user gain access to
data and change it, it loses its integrity.
• They might delete some information or add
incorrect information.
• This happens very commonly on websites.
Therefore, it is important to protect
information from any unauthorized changes.
FORMS OF SECURITY THREATS
Forms of security threats
• Threats to data privacy, identity and integrity
can take several forms.
• We should know about these forms.
• Some of them are:
1. Internet fraud
2. Hacking
3. Phishing
4. Adware & spyware
Internet Fraud
• Fraud happens when a person cheats another
for some financial gain. it is quite common in
business.
• Internet fraud take place online and it is very
easy because buyers and sellers cannot see
each other or meet personally.
• Internet fraud can take the form of scams.
Continued…
• A scam is committed when a person promises
to give out huge prizes to the people who
provide their personal details on a website or
through email. However, after providing
personal data, they receive nothing.
• The fraudster disappears with all their
personal information and cannot be caught.
• He might then use that information to commit
crimes.
Hacking
• Hackers are people who gain access to a
computer without the knowledge of the
original user.
• He can steal the data or can change it.
• Hackers usually target e-commerce websites
and online banking websites.
• A hacker might hack a system to steal money
and information, or just for fun.
Phishing
• It is an illegal activity. It happens when someone
pretends to be a reliable organization, such as a
bank, to obtain personal information.
• The phisher creates a website similar to the
website of an actual bank. The phisher then sends
email messages to the customers of the actual
bank asking them to visit the phisher’s website.
• The customers give away their personal
information such as their bank account number.
The phisher can misuse this information.
Adware and spyware
• Adware is a type of software that is annoying but
harmless.
• When a user visit a webite , adware display pop-
up advertisements on the computer screen.
• Sometimes adware runs with another type of
software called spyware.
• Spyware monitors the websites the user visit.
• It sends the information to a pre-defined source.
Continued…
• That source can then misuse that information
or sell them to the interested parties, such as
owner of the websites.
• The owners use this information to make their
website more interesting because they know
what type of websites different users visit.
Sources of security threats
• Some sources of security threats are:
• Computer viruses
• Trojan horse
• Worms
• We can protect our data from such threats I
we know where these threats come from.
Common modes of security threats
• We know where threats to data security come
from. We also know how the virus, worm and
Trojan horse enter our system.
• That help us to create barriers that prevent
them from infecting our computers.
• Common modes of security threats are:
1. Infected drives and devices
2. Email attachments
3. Unsecured websites
4. Pirated software
Infected drives and devices
• Viruses can infect any kind of device such as
hard disk, CD,USB etc. When we connect this
device to other computer, the computer get
infected too.
• Viruses destroy data stored on the computer or
cause it to malfunction.
• We should avoid using portable storage devices
from unknown sources and should install an
antivirus program.
Email attachments
• Some internet users circulate a virus infected
email messages that can cause harm to
computer system and result in loss of data
when the user click on email attachment .
• We can avoid this by only opening email sent
by people we know.
Unsecured websites
• Each website offers contents that attracts user.
• These users might also include hackers. They
might hack these websites so that any
personal data that users provide to the
website is redirected to the hackers.
• Website should maintain high security levels
and users should think twice before giving
away personal information to anyone on
internet
Pirated software
• Most companies require users to pay a certain
amount of money as licensing fee before installing
and using their software.
• If a user obtain that software from some other
source and start using it without paying, this s
called software piracy.
• Pirated software is a copied software from a local
computer vendor. Most of the time the vendor’s
computer is virus infected and that virus being
transferred to the CD and would be transferred to
our computer.
Antivirus Software
• Computer viruses are extremely dangerous for the
computer and the information stored on it.
• Antivirus programs have been designed to prevent
viruses from affecting our data.
• They detect computer viruses and make them
ineffective.
• A virus is a program written in some programming
language. When this program is represented in
machine code, it is called virus definition.
Continued…
• Antivirus software contains a store of several
virus definitions.
• To identify a virus that has infected the
computer, it matches its code to virus
definition stored in its database.
• An antivirus can only control a virus if the
virus definition is stored in its database.
• New viruses are being created all the time. It
is impossible for a single antivirus to have all
possible virus definition in its database.
• It is important to update an antivirus on
regular basis to add new virus definition in its
database.
Continued…
Data protection and security

More Related Content

What's hot

Network security
Network securityNetwork security
Network securityEstiak Khan
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporationsharmaakash1881
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Accessing information
Accessing informationAccessing information
Accessing informationFiona Beals
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxRichardSugbo
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitysanjana mun
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Data security
Data securityData security
Data security
 
Accessing information
Accessing informationAccessing information
Accessing information
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber security
Cyber securityCyber security
Cyber security
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 

Similar to Data protection and security

Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyAnjan Mahanta
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityAvani Patel
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeNithilan1
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 

Similar to Data protection and security (20)

Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cyber security
Cyber security Cyber security
Cyber security
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 

More from samina khan

UNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptxUNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptxsamina khan
 
INFORMATION TECHNOLOGY.pptx
INFORMATION TECHNOLOGY.pptxINFORMATION TECHNOLOGY.pptx
INFORMATION TECHNOLOGY.pptxsamina khan
 
scaffolding in teaching.pptx
scaffolding in teaching.pptxscaffolding in teaching.pptx
scaffolding in teaching.pptxsamina khan
 
REFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptxREFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptxsamina khan
 
PEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptxPEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptxsamina khan
 
What is an Autobiography?
 What is an Autobiography? What is an Autobiography?
What is an Autobiography?samina khan
 
Picture description
Picture descriptionPicture description
Picture descriptionsamina khan
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Websamina khan
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethicssamina khan
 
Computer logic and gates
Computer logic and gatesComputer logic and gates
Computer logic and gatessamina khan
 
Computer networks
Computer networksComputer networks
Computer networkssamina khan
 
Classroom management
Classroom managementClassroom management
Classroom managementsamina khan
 
More on number system
More on number systemMore on number system
More on number systemsamina khan
 
Stress management
Stress managementStress management
Stress managementsamina khan
 
Classroom management
Classroom managementClassroom management
Classroom managementsamina khan
 
The future of technology
The future of technologyThe future of technology
The future of technologysamina khan
 
Lesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numbersLesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numberssamina khan
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7samina khan
 
Applications of computer
Applications of computerApplications of computer
Applications of computersamina khan
 

More from samina khan (20)

UNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptxUNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptx
 
INFORMATION TECHNOLOGY.pptx
INFORMATION TECHNOLOGY.pptxINFORMATION TECHNOLOGY.pptx
INFORMATION TECHNOLOGY.pptx
 
scaffolding in teaching.pptx
scaffolding in teaching.pptxscaffolding in teaching.pptx
scaffolding in teaching.pptx
 
REFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptxREFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptx
 
PEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptxPEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptx
 
What is an Autobiography?
 What is an Autobiography? What is an Autobiography?
What is an Autobiography?
 
Picture description
Picture descriptionPicture description
Picture description
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Computer logic and gates
Computer logic and gatesComputer logic and gates
Computer logic and gates
 
Problem solving
Problem solvingProblem solving
Problem solving
 
Computer networks
Computer networksComputer networks
Computer networks
 
Classroom management
Classroom managementClassroom management
Classroom management
 
More on number system
More on number systemMore on number system
More on number system
 
Stress management
Stress managementStress management
Stress management
 
Classroom management
Classroom managementClassroom management
Classroom management
 
The future of technology
The future of technologyThe future of technology
The future of technology
 
Lesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numbersLesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numbers
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
 

Recently uploaded

定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdfkeithzhangding
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 

Recently uploaded (20)

定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 

Data protection and security

  • 1. 12/3/2019 1 Samina khan Fazaia Degree College Risalpur
  • 2. • Chapter 1 More on Number System • Chapter 2 Working on Word • Chapter 3 Working with Spreadsheet • Chapter 4 Problem solving • Chapter 5 Introduction to programming • Chapter 6 Programming in GW-BASIC • Chapter 7 Data verification & validation • Chapter 8 Data protection & security • Chapter 9 Applications of computers • Chapter 11 The future of Technology • Chapter 12 Creating webpages 12/3/2019 2
  • 4.
  • 5. What is data protection and security? • Being connected to the internet involves sharing a lot of information. • We disclose our address, bank account number, and credit card number when we shop online. • All of this information is personal. It should not be shown to any unconcerned person. • Both businesses and users suffer because of poor information security. • Your personal data might reveal things that you would not like to disclose to the general public.
  • 6. Continued… • This information can be stolen from a business’s database. This data can be used to harass people, commit fraud and engage in other criminal activities. • It is important for the businesses to protect their customers’ data from being stolen or misused.
  • 7. Common security issues • Problem of data security has grown up due to sharing of information on internet. • Some of them are internet fraud & viruses.
  • 8. Data Privacy • Some information are private and we don’t like to disclose it to people we don’t know personally. • Such information include our address, telephone number, password and bank account number. • Data privacy involves protecting information and allowing access to relevant people only. • Businesses need to keep their customer data secure and keep password secret or asking you a secret question.
  • 9. Identity theft • Identity thief gain access to a person’s personal information without his knowledge. • Such personal information are password, credit card number, bank account number etc. • He can use such information to commit crime. When the police try to trace the criminal, they end up arresting the person whose identity was stolen.
  • 10. Continued… • Employees who are fired from their jobs might steal the personal data of customer as a form of revenge against the company . • Some thieves might use this information to purchase items and then charge them to the original person’s credit card without his knowledge.
  • 11. Data Integrity • Three attributes of data integrity are: 1. Complete 2. Accurate 3. Sensible
  • 12. Continued… • When an unauthorized user gain access to data and change it, it loses its integrity. • They might delete some information or add incorrect information. • This happens very commonly on websites. Therefore, it is important to protect information from any unauthorized changes.
  • 13. FORMS OF SECURITY THREATS
  • 14. Forms of security threats • Threats to data privacy, identity and integrity can take several forms. • We should know about these forms. • Some of them are: 1. Internet fraud 2. Hacking 3. Phishing 4. Adware & spyware
  • 15. Internet Fraud • Fraud happens when a person cheats another for some financial gain. it is quite common in business. • Internet fraud take place online and it is very easy because buyers and sellers cannot see each other or meet personally. • Internet fraud can take the form of scams.
  • 16. Continued… • A scam is committed when a person promises to give out huge prizes to the people who provide their personal details on a website or through email. However, after providing personal data, they receive nothing. • The fraudster disappears with all their personal information and cannot be caught. • He might then use that information to commit crimes.
  • 17. Hacking • Hackers are people who gain access to a computer without the knowledge of the original user. • He can steal the data or can change it. • Hackers usually target e-commerce websites and online banking websites. • A hacker might hack a system to steal money and information, or just for fun.
  • 18. Phishing • It is an illegal activity. It happens when someone pretends to be a reliable organization, such as a bank, to obtain personal information. • The phisher creates a website similar to the website of an actual bank. The phisher then sends email messages to the customers of the actual bank asking them to visit the phisher’s website. • The customers give away their personal information such as their bank account number. The phisher can misuse this information.
  • 19. Adware and spyware • Adware is a type of software that is annoying but harmless. • When a user visit a webite , adware display pop- up advertisements on the computer screen. • Sometimes adware runs with another type of software called spyware. • Spyware monitors the websites the user visit. • It sends the information to a pre-defined source.
  • 20. Continued… • That source can then misuse that information or sell them to the interested parties, such as owner of the websites. • The owners use this information to make their website more interesting because they know what type of websites different users visit.
  • 21. Sources of security threats • Some sources of security threats are: • Computer viruses • Trojan horse • Worms • We can protect our data from such threats I we know where these threats come from.
  • 22. Common modes of security threats • We know where threats to data security come from. We also know how the virus, worm and Trojan horse enter our system. • That help us to create barriers that prevent them from infecting our computers. • Common modes of security threats are: 1. Infected drives and devices 2. Email attachments 3. Unsecured websites 4. Pirated software
  • 23. Infected drives and devices • Viruses can infect any kind of device such as hard disk, CD,USB etc. When we connect this device to other computer, the computer get infected too. • Viruses destroy data stored on the computer or cause it to malfunction. • We should avoid using portable storage devices from unknown sources and should install an antivirus program.
  • 24. Email attachments • Some internet users circulate a virus infected email messages that can cause harm to computer system and result in loss of data when the user click on email attachment . • We can avoid this by only opening email sent by people we know.
  • 25. Unsecured websites • Each website offers contents that attracts user. • These users might also include hackers. They might hack these websites so that any personal data that users provide to the website is redirected to the hackers. • Website should maintain high security levels and users should think twice before giving away personal information to anyone on internet
  • 26. Pirated software • Most companies require users to pay a certain amount of money as licensing fee before installing and using their software. • If a user obtain that software from some other source and start using it without paying, this s called software piracy. • Pirated software is a copied software from a local computer vendor. Most of the time the vendor’s computer is virus infected and that virus being transferred to the CD and would be transferred to our computer.
  • 27. Antivirus Software • Computer viruses are extremely dangerous for the computer and the information stored on it. • Antivirus programs have been designed to prevent viruses from affecting our data. • They detect computer viruses and make them ineffective. • A virus is a program written in some programming language. When this program is represented in machine code, it is called virus definition.
  • 28. Continued… • Antivirus software contains a store of several virus definitions. • To identify a virus that has infected the computer, it matches its code to virus definition stored in its database. • An antivirus can only control a virus if the virus definition is stored in its database.
  • 29. • New viruses are being created all the time. It is impossible for a single antivirus to have all possible virus definition in its database. • It is important to update an antivirus on regular basis to add new virus definition in its database. Continued…