SlideShare a Scribd company logo
Computer Security
Computer security is the process of preventing and detecting unauthorized
us of your computer. Prevention measures help you to stop unauthorized
users (also knows as intruders) from accessing any part of your computer
system. Detection helps your determine weather or not someone attempted
to break into your system, if they were successful and what they may have
done.




1

More Related Content

What's hot

Security and Control Issues in information Systems
Security and Control Issues in information SystemsSecurity and Control Issues in information Systems
Security and Control Issues in information Systems
Dr. Rosemarie Sibbaluca-Guirre
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
 
Demo
DemoDemo
Demo
virus_kyo
 
Network Security
Network SecurityNetwork Security
Network Security
EILLEN IVY PORTUGUEZ
 
Operating systems
Operating systemsOperating systems
Operating systems
CONSUELO SIMÓN
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
HardikBhandari7
 
Computer System Security
Computer System SecurityComputer System Security
Computer System Security
SURBHI SAROHA
 
Security curator presentation_eng
Security curator presentation_engSecurity curator presentation_eng
Security curator presentation_eng
atompark2
 
Demonstration Presentation
Demonstration PresentationDemonstration Presentation
Demonstration Presentation
Jerry Reyes
 
Mobile device security using transient authentication
Mobile device security using transient authenticationMobile device security using transient authentication
Mobile device security using transient authentication
Paulo Martins
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and Ethics
Jeremy Flores
 

What's hot (11)

Security and Control Issues in information Systems
Security and Control Issues in information SystemsSecurity and Control Issues in information Systems
Security and Control Issues in information Systems
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Demo
DemoDemo
Demo
 
Network Security
Network SecurityNetwork Security
Network Security
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
 
Computer System Security
Computer System SecurityComputer System Security
Computer System Security
 
Security curator presentation_eng
Security curator presentation_engSecurity curator presentation_eng
Security curator presentation_eng
 
Demonstration Presentation
Demonstration PresentationDemonstration Presentation
Demonstration Presentation
 
Mobile device security using transient authentication
Mobile device security using transient authenticationMobile device security using transient authentication
Mobile device security using transient authentication
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and Ethics
 

Viewers also liked

veckobrev 21
veckobrev 21veckobrev 21
veckobrev 21erikeles
 
Case Solution for Magna International, Inc. (A)
Case Solution for Magna International, Inc. (A)Case Solution for Magna International, Inc. (A)
Case Solution for Magna International, Inc. (A)
casesolutions
 
RESUME
RESUMERESUME
RESUME
Bharti Jain
 
Classifica di società Memorial Bonetti Gratacasolo
Classifica di società Memorial Bonetti GratacasoloClassifica di società Memorial Bonetti Gratacasolo
Classifica di società Memorial Bonetti Gratacasolo
Giuliano Ganassi
 
μπίλια δίσκος δακτυλίδι
μπίλια δίσκος δακτυλίδιμπίλια δίσκος δακτυλίδι
μπίλια δίσκος δακτυλίδι
Μαυρουδης Μακης
 
Infografia
InfografiaInfografia
Infografia
sonisofi
 
WVWC - Marketing
WVWC - MarketingWVWC - Marketing
WVWC - Marketing
Duane B Thomas
 

Viewers also liked (8)

veckobrev 21
veckobrev 21veckobrev 21
veckobrev 21
 
Case Solution for Magna International, Inc. (A)
Case Solution for Magna International, Inc. (A)Case Solution for Magna International, Inc. (A)
Case Solution for Magna International, Inc. (A)
 
RESUME
RESUMERESUME
RESUME
 
Classifica di società Memorial Bonetti Gratacasolo
Classifica di società Memorial Bonetti GratacasoloClassifica di società Memorial Bonetti Gratacasolo
Classifica di società Memorial Bonetti Gratacasolo
 
Dr V Marshall Koori Mail 71 15 Water policy changes
Dr V Marshall Koori Mail 71 15 Water policy changesDr V Marshall Koori Mail 71 15 Water policy changes
Dr V Marshall Koori Mail 71 15 Water policy changes
 
μπίλια δίσκος δακτυλίδι
μπίλια δίσκος δακτυλίδιμπίλια δίσκος δακτυλίδι
μπίλια δίσκος δακτυλίδι
 
Infografia
InfografiaInfografia
Infografia
 
WVWC - Marketing
WVWC - MarketingWVWC - Marketing
WVWC - Marketing
 

120911 excersize 1

  • 1. Computer Security Computer security is the process of preventing and detecting unauthorized us of your computer. Prevention measures help you to stop unauthorized users (also knows as intruders) from accessing any part of your computer system. Detection helps your determine weather or not someone attempted to break into your system, if they were successful and what they may have done. 1