SlideShare a Scribd company logo
1
System Security
Chapter no 16
2
Computer Security
 Computer security is concerned with taking care
of hardware, Software and data
 The cost of creating data again from scratch can
hardware or program lost.
 Loss of data can have various consequences
 Bad business decision
 Loss of goodwill from customers
 Cash flow problems
 Adverse publicity from the press
 Late delivery of goods
 Failure to receive payment
3
Physical security
 Computer equipment and its data need
to be protected from physical harm
 These include natural ones such as
 Fire
 Lighting
 Water damage
 Theft
4
Computer theft
 There are many ways of making sure
that unauthorized people are denied
access to a system through use of
keyboard locks and password
 It is more difficult to prevent a thief from
picking up a system and stealing it
 Locks alarmed on circuit board and tags
are method of hardware protection
5
Preventing theft
 Note the serial no of computers and
peripherals
 Lock the computers in case and key
should be safely saved
 Data should be backed up regularly
 All staff aware of security
 All staff wear security badge which
contains their photograph, name
6
Protection from fires
 Fireproof doors help contain fire
 Use Smoke detectors
 Use gas folding systems are used in
large computer installations
7
Protection from dust and
extremes of temperature
 Air conditioning is more important for
larger mainframe system where the
temperature and humidity must be
controlled
 The air must also be pure and filtered in
this way
8
Software Security
 Viruses
 Viruses are programs the purpose of which is
to disrupt the sensible use of computer.
 Many viruses do little more than display
message on the screen
 Some are designed to act after a certain
period of time which drop off the screen or
erased the entire content of hard disk
 Viruses are able to spread from one disk to
other
9
Anti virus software
 Antivirus software can be used to scan
the computer’s memory and disks to
detect the viruses
 Any viruses detected are then removed
using the software
10
Avoiding viruses
 Don’t buy secondhand software
 Check your computer for viruses if it has
been recently repaired
 Be suspicious of all software which are
freeware ,shareware
 Not to use too many computers
 Install antivirus software which check the
hard disk every time the system is booted up
11
Backing up data
 Means taking the copy of the data and
keeping it away from the computer in a
secure place.
 It is not good keeping a back up copy on the
same disk
 The most common way to lose a file is
through user error by deleting the file
 There are software packages available to
recover such data
12
Rules of backing up
 Never keep backup disks near the computer
 One set of back up disks in a different place
 If data is expensive to recreate then invest in
a fire-proof safe to protect your backups
against theft and fire
 Placing important computer files in safe place
so that they can be found easily if needed
,which is called archiving
13
Disk failure
 All micro computers will suffer at least one serious fault during
their lifetimes
 A typical hard disk failures mean time is between 20000 to
200000 hours
 This mean if computer was used for 12 hr per day then it means
that hard disk will break down one about six years
 If a computer was used for network server then used 24 hr so its
mean break down will every 27 months
Avoiding disk failure
 Back up copies of programs and data on a hard disk should be
taken at regular interval for this tape streamers is used
 Floppy disk is also used for backup disk data
 Use two hard disks in parallel with each other
14
Protecting files
 Password is keyed in which is never shown in
screen
 Use software to limit each user’s access to
only those files that are needed for the
performance of their particular job
 To restrict access to a computer’s OS for
inexperienced users
 Restricted access can also be used to
prevent people from copying data from the
hard disk to a floppy disk
15
Encryption
 Files contain sensitive data are encrypted or coded
 If a tape or disk containing sensitive files is stolen it
would then be impossible to read the data without
decoder
 Encryption is also used when important data is
transmitted from one place to other
 The data is coded before being sent and then
decoded at the other end.
 Both processes are performed automatically by
computers
 When people are making payments for goods bought
over internet using a credit or debit card the details
are always encrypted
16
Data integrity
 Is concerned with the correctness of the data
Errors may be introduced into data in a variety
of ways They can be introduced when the
person typing in the data misreads it off a
source document or if machine errors corrupt
the data Validation and verifications checks
are performed on data to ensure its integrity
17
Data Security
 Is concerned with keeping the data safe
from the various hazards that could
destroy it.
18
Transaction Logs
 When you make changes to the data in a file
you usually delete the old information and
replace it with the new information
 If you have a bank or building society
account, money added to your account or
taken out needs to be recorded
 Each bit of business is called transaction
 The account statement showing the amounts
entering and leaving the account shows

More Related Content

What's hot

System security
System securitySystem security
System security
sommerville-videos
 
Database security
Database security Database security
Database security
Shivnandan Singh
 
System security
System securitySystem security
System security
invertis university
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
Mukesh Chinta
 
Security Measure
Security MeasureSecurity Measure
Security Measure
syafiqa
 
Maintain A Secure, Independent Network For Survey Projects
Maintain A Secure, Independent Network For Survey Projects Maintain A Secure, Independent Network For Survey Projects
Maintain A Secure, Independent Network For Survey Projects
Data Force Research
 
Do not run business without protection!
Do not run business without protection!Do not run business without protection!
Do not run business without protection!
Thomas Miller
 
Database security
Database securityDatabase security
Database security
afzaalkhalid1
 
System Security
System SecuritySystem Security
System Security
Reddhi Basu
 
Essentials of PCI Assessment
Essentials of PCI AssessmentEssentials of PCI Assessment
Essentials of PCI Assessment
Gazzang
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
e-Safe Systems
 
Notacd02
Notacd02Notacd02
Notacd02
cikgushaharizan
 
System security
System securitySystem security
System security
ReachLocal Services India
 
Safeguard your business with Microsoft Office 365 and PlanBcp
Safeguard your business with Microsoft Office 365 and PlanBcpSafeguard your business with Microsoft Office 365 and PlanBcp
Safeguard your business with Microsoft Office 365 and PlanBcp
arnoldvilleneuve
 
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITYFOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
Tim O'Leary
 
Document Security
Document SecurityDocument Security
Document Security
Tim O'Leary
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
Deepak John
 
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Seo Tss
 
Windows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITProsWindows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITPros
Juan Ignacio Oller Aznar
 

What's hot (20)

System security
System securitySystem security
System security
 
Database security
Database security Database security
Database security
 
System security
System securitySystem security
System security
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 
Security Measure
Security MeasureSecurity Measure
Security Measure
 
Maintain A Secure, Independent Network For Survey Projects
Maintain A Secure, Independent Network For Survey Projects Maintain A Secure, Independent Network For Survey Projects
Maintain A Secure, Independent Network For Survey Projects
 
Do not run business without protection!
Do not run business without protection!Do not run business without protection!
Do not run business without protection!
 
Database security
Database securityDatabase security
Database security
 
System Security
System SecuritySystem Security
System Security
 
Essentials of PCI Assessment
Essentials of PCI AssessmentEssentials of PCI Assessment
Essentials of PCI Assessment
 
system Security
system Security system Security
system Security
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
 
Notacd02
Notacd02Notacd02
Notacd02
 
System security
System securitySystem security
System security
 
Safeguard your business with Microsoft Office 365 and PlanBcp
Safeguard your business with Microsoft Office 365 and PlanBcpSafeguard your business with Microsoft Office 365 and PlanBcp
Safeguard your business with Microsoft Office 365 and PlanBcp
 
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITYFOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
 
Document Security
Document SecurityDocument Security
Document Security
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
 
Windows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITProsWindows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITPros
 

Similar to Ch 16 system security

4.-Computer-Security for grade 10 preparation.pptx
4.-Computer-Security for grade 10 preparation.pptx4.-Computer-Security for grade 10 preparation.pptx
4.-Computer-Security for grade 10 preparation.pptx
PurnaBahadurRana1
 
Computer security
Computer securityComputer security
Computer security
Ayesha Arshad
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
Tabsheer Hasan
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
Wollo UNiversity
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
MISY
 
Computer security
Computer securityComputer security
Computer security
RoshanMaharjan13
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
MISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
MISY
 
Notacd02
Notacd02Notacd02
Notacd02
Azmiah Mahmud
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
Khristine Botin
 
08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt
Roshni814224
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.ppt
Roshni814224
 
Ransomware
RansomwareRansomware
Protecting Your Computer
Protecting Your ComputerProtecting Your Computer
Protecting Your Computer
university of education,Lahore
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
Jan Wong
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
mahaliacaraan
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
wolverine0614
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
CreatorsCircle
 

Similar to Ch 16 system security (20)

4.-Computer-Security for grade 10 preparation.pptx
4.-Computer-Security for grade 10 preparation.pptx4.-Computer-Security for grade 10 preparation.pptx
4.-Computer-Security for grade 10 preparation.pptx
 
Computer security
Computer securityComputer security
Computer security
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
Computer security
Computer securityComputer security
Computer security
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Notacd02
Notacd02Notacd02
Notacd02
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.ppt
 
Ransomware
RansomwareRansomware
Ransomware
 
Protecting Your Computer
Protecting Your ComputerProtecting Your Computer
Protecting Your Computer
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 

More from Khan Yousafzai

14 data logging
14   data logging14   data logging
14 data logging
Khan Yousafzai
 
09.1 types of computer operation
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operation
Khan Yousafzai
 
8.2 system analysis and design
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and design
Khan Yousafzai
 
8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving
Khan Yousafzai
 
Ch 26 the internet
Ch 26 the internetCh 26 the internet
Ch 26 the internet
Khan Yousafzai
 
Ch 22 the electronic office
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic office
Khan Yousafzai
 
Ch 21 computer and your health
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your health
Khan Yousafzai
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of it
Khan Yousafzai
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections act
Khan Yousafzai
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
Khan Yousafzai
 
Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)
Khan Yousafzai
 
Ch 13 system analysis
Ch 13 system analysisCh 13 system analysis
Ch 13 system analysis
Khan Yousafzai
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information system
Khan Yousafzai
 
Ch 11 ways of presenting data
Ch 11 ways of presenting dataCh 11 ways of presenting data
Ch 11 ways of presenting data
Khan Yousafzai
 
Ch 9 types of computer operations
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operations
Khan Yousafzai
 
Ch 8 data base
Ch 8 data baseCh 8 data base
Ch 8 data base
Khan Yousafzai
 
Ch 6 collecting your data
Ch 6 collecting your dataCh 6 collecting your data
Ch 6 collecting your data
Khan Yousafzai
 
Ch10 data transfer
Ch10 data transferCh10 data transfer
Ch10 data transfer
Khan Yousafzai
 
23 simulations
23   simulations23   simulations
23 simulations
Khan Yousafzai
 
18 computers and the law
18   computers and the law18   computers and the law
18 computers and the law
Khan Yousafzai
 

More from Khan Yousafzai (20)

14 data logging
14   data logging14   data logging
14 data logging
 
09.1 types of computer operation
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operation
 
8.2 system analysis and design
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and design
 
8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving
 
Ch 26 the internet
Ch 26 the internetCh 26 the internet
Ch 26 the internet
 
Ch 22 the electronic office
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic office
 
Ch 21 computer and your health
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your health
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of it
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections act
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)
 
Ch 13 system analysis
Ch 13 system analysisCh 13 system analysis
Ch 13 system analysis
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information system
 
Ch 11 ways of presenting data
Ch 11 ways of presenting dataCh 11 ways of presenting data
Ch 11 ways of presenting data
 
Ch 9 types of computer operations
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operations
 
Ch 8 data base
Ch 8 data baseCh 8 data base
Ch 8 data base
 
Ch 6 collecting your data
Ch 6 collecting your dataCh 6 collecting your data
Ch 6 collecting your data
 
Ch10 data transfer
Ch10 data transferCh10 data transfer
Ch10 data transfer
 
23 simulations
23   simulations23   simulations
23 simulations
 
18 computers and the law
18   computers and the law18   computers and the law
18 computers and the law
 

Recently uploaded

Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 

Recently uploaded (20)

Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 

Ch 16 system security

  • 2. 2 Computer Security  Computer security is concerned with taking care of hardware, Software and data  The cost of creating data again from scratch can hardware or program lost.  Loss of data can have various consequences  Bad business decision  Loss of goodwill from customers  Cash flow problems  Adverse publicity from the press  Late delivery of goods  Failure to receive payment
  • 3. 3 Physical security  Computer equipment and its data need to be protected from physical harm  These include natural ones such as  Fire  Lighting  Water damage  Theft
  • 4. 4 Computer theft  There are many ways of making sure that unauthorized people are denied access to a system through use of keyboard locks and password  It is more difficult to prevent a thief from picking up a system and stealing it  Locks alarmed on circuit board and tags are method of hardware protection
  • 5. 5 Preventing theft  Note the serial no of computers and peripherals  Lock the computers in case and key should be safely saved  Data should be backed up regularly  All staff aware of security  All staff wear security badge which contains their photograph, name
  • 6. 6 Protection from fires  Fireproof doors help contain fire  Use Smoke detectors  Use gas folding systems are used in large computer installations
  • 7. 7 Protection from dust and extremes of temperature  Air conditioning is more important for larger mainframe system where the temperature and humidity must be controlled  The air must also be pure and filtered in this way
  • 8. 8 Software Security  Viruses  Viruses are programs the purpose of which is to disrupt the sensible use of computer.  Many viruses do little more than display message on the screen  Some are designed to act after a certain period of time which drop off the screen or erased the entire content of hard disk  Viruses are able to spread from one disk to other
  • 9. 9 Anti virus software  Antivirus software can be used to scan the computer’s memory and disks to detect the viruses  Any viruses detected are then removed using the software
  • 10. 10 Avoiding viruses  Don’t buy secondhand software  Check your computer for viruses if it has been recently repaired  Be suspicious of all software which are freeware ,shareware  Not to use too many computers  Install antivirus software which check the hard disk every time the system is booted up
  • 11. 11 Backing up data  Means taking the copy of the data and keeping it away from the computer in a secure place.  It is not good keeping a back up copy on the same disk  The most common way to lose a file is through user error by deleting the file  There are software packages available to recover such data
  • 12. 12 Rules of backing up  Never keep backup disks near the computer  One set of back up disks in a different place  If data is expensive to recreate then invest in a fire-proof safe to protect your backups against theft and fire  Placing important computer files in safe place so that they can be found easily if needed ,which is called archiving
  • 13. 13 Disk failure  All micro computers will suffer at least one serious fault during their lifetimes  A typical hard disk failures mean time is between 20000 to 200000 hours  This mean if computer was used for 12 hr per day then it means that hard disk will break down one about six years  If a computer was used for network server then used 24 hr so its mean break down will every 27 months Avoiding disk failure  Back up copies of programs and data on a hard disk should be taken at regular interval for this tape streamers is used  Floppy disk is also used for backup disk data  Use two hard disks in parallel with each other
  • 14. 14 Protecting files  Password is keyed in which is never shown in screen  Use software to limit each user’s access to only those files that are needed for the performance of their particular job  To restrict access to a computer’s OS for inexperienced users  Restricted access can also be used to prevent people from copying data from the hard disk to a floppy disk
  • 15. 15 Encryption  Files contain sensitive data are encrypted or coded  If a tape or disk containing sensitive files is stolen it would then be impossible to read the data without decoder  Encryption is also used when important data is transmitted from one place to other  The data is coded before being sent and then decoded at the other end.  Both processes are performed automatically by computers  When people are making payments for goods bought over internet using a credit or debit card the details are always encrypted
  • 16. 16 Data integrity  Is concerned with the correctness of the data Errors may be introduced into data in a variety of ways They can be introduced when the person typing in the data misreads it off a source document or if machine errors corrupt the data Validation and verifications checks are performed on data to ensure its integrity
  • 17. 17 Data Security  Is concerned with keeping the data safe from the various hazards that could destroy it.
  • 18. 18 Transaction Logs  When you make changes to the data in a file you usually delete the old information and replace it with the new information  If you have a bank or building society account, money added to your account or taken out needs to be recorded  Each bit of business is called transaction  The account statement showing the amounts entering and leaving the account shows