SlideShare a Scribd company logo
12/3/2019 1
Samina khan
Fazaia Degree College Risalpur
• Chapter 1 More on Number System
• Chapter 2 Working on Word
• Chapter 3 Working with Spreadsheet
• Chapter 4 Problem solving
• Chapter 5 Introduction to programming
• Chapter 6 Programming in GW-BASIC
• Chapter 7 Data verification & validation
• Chapter 8 Data protection & security
• Chapter 9 Applications of computers
• Chapter 11 The future of Technology
• Chapter 12 Creating webpages
12/3/2019
2
CHAPTER 8
What is data protection and security?
• Being connected to the internet involves sharing
a lot of information.
• We disclose our address, bank account number,
and credit card number when we shop online.
• All of this information is personal. It should not
be shown to any unconcerned person.
• Both businesses and users suffer because of
poor information security.
• Your personal data might reveal things that you
would not like to disclose to the general public.
Continued…
• This information can be stolen from a business’s
database. This data can be used to harass
people, commit fraud and engage in other
criminal activities.
• It is important for the businesses to protect
their customers’ data from being stolen or
misused.
Common security issues
• Problem of data security has grown up due to
sharing of information on internet.
• Some of them are internet fraud & viruses.
Data Privacy
• Some information are private and we don’t like to
disclose it to people we don’t know personally.
• Such information include our address, telephone
number, password and bank account number.
• Data privacy involves protecting information and
allowing access to relevant people only.
• Businesses need to keep their customer data
secure and keep password secret or asking you a
secret question.
Identity theft
• Identity thief gain access to a person’s personal
information without his knowledge.
• Such personal information are password,
credit card number, bank account number etc.
• He can use such information to commit crime.
When the police try to trace the criminal, they
end up arresting the person whose identity
was stolen.
Continued…
• Employees who are fired from their jobs might
steal the personal data of customer as a form
of revenge against the company .
• Some thieves might use this information to
purchase items and then charge them to the
original person’s credit card without his
knowledge.
Data Integrity
• Three attributes of data integrity are:
1. Complete
2. Accurate
3. Sensible
Continued…
• When an unauthorized user gain access to
data and change it, it loses its integrity.
• They might delete some information or add
incorrect information.
• This happens very commonly on websites.
Therefore, it is important to protect
information from any unauthorized changes.
FORMS OF SECURITY THREATS
Forms of security threats
• Threats to data privacy, identity and integrity
can take several forms.
• We should know about these forms.
• Some of them are:
1. Internet fraud
2. Hacking
3. Phishing
4. Adware & spyware
Internet Fraud
• Fraud happens when a person cheats another
for some financial gain. it is quite common in
business.
• Internet fraud take place online and it is very
easy because buyers and sellers cannot see
each other or meet personally.
• Internet fraud can take the form of scams.
Continued…
• A scam is committed when a person promises
to give out huge prizes to the people who
provide their personal details on a website or
through email. However, after providing
personal data, they receive nothing.
• The fraudster disappears with all their
personal information and cannot be caught.
• He might then use that information to commit
crimes.
Hacking
• Hackers are people who gain access to a
computer without the knowledge of the
original user.
• He can steal the data or can change it.
• Hackers usually target e-commerce websites
and online banking websites.
• A hacker might hack a system to steal money
and information, or just for fun.
Phishing
• It is an illegal activity. It happens when someone
pretends to be a reliable organization, such as a
bank, to obtain personal information.
• The phisher creates a website similar to the
website of an actual bank. The phisher then sends
email messages to the customers of the actual
bank asking them to visit the phisher’s website.
• The customers give away their personal
information such as their bank account number.
The phisher can misuse this information.
Adware and spyware
• Adware is a type of software that is annoying but
harmless.
• When a user visit a webite , adware display pop-
up advertisements on the computer screen.
• Sometimes adware runs with another type of
software called spyware.
• Spyware monitors the websites the user visit.
• It sends the information to a pre-defined source.
Continued…
• That source can then misuse that information
or sell them to the interested parties, such as
owner of the websites.
• The owners use this information to make their
website more interesting because they know
what type of websites different users visit.
Sources of security threats
• Some sources of security threats are:
• Computer viruses
• Trojan horse
• Worms
• We can protect our data from such threats I
we know where these threats come from.
Common modes of security threats
• We know where threats to data security come
from. We also know how the virus, worm and
Trojan horse enter our system.
• That help us to create barriers that prevent
them from infecting our computers.
• Common modes of security threats are:
1. Infected drives and devices
2. Email attachments
3. Unsecured websites
4. Pirated software
Infected drives and devices
• Viruses can infect any kind of device such as
hard disk, CD,USB etc. When we connect this
device to other computer, the computer get
infected too.
• Viruses destroy data stored on the computer or
cause it to malfunction.
• We should avoid using portable storage devices
from unknown sources and should install an
antivirus program.
Email attachments
• Some internet users circulate a virus infected
email messages that can cause harm to
computer system and result in loss of data
when the user click on email attachment .
• We can avoid this by only opening email sent
by people we know.
Unsecured websites
• Each website offers contents that attracts user.
• These users might also include hackers. They
might hack these websites so that any
personal data that users provide to the
website is redirected to the hackers.
• Website should maintain high security levels
and users should think twice before giving
away personal information to anyone on
internet
Pirated software
• Most companies require users to pay a certain
amount of money as licensing fee before installing
and using their software.
• If a user obtain that software from some other
source and start using it without paying, this s
called software piracy.
• Pirated software is a copied software from a local
computer vendor. Most of the time the vendor’s
computer is virus infected and that virus being
transferred to the CD and would be transferred to
our computer.
Antivirus Software
• Computer viruses are extremely dangerous for the
computer and the information stored on it.
• Antivirus programs have been designed to prevent
viruses from affecting our data.
• They detect computer viruses and make them
ineffective.
• A virus is a program written in some programming
language. When this program is represented in
machine code, it is called virus definition.
Continued…
• Antivirus software contains a store of several
virus definitions.
• To identify a virus that has infected the
computer, it matches its code to virus
definition stored in its database.
• An antivirus can only control a virus if the
virus definition is stored in its database.
• New viruses are being created all the time. It
is impossible for a single antivirus to have all
possible virus definition in its database.
• It is important to update an antivirus on
regular basis to add new virus definition in its
database.
Continued…
Data protection and security

More Related Content

What's hot

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
sidra batool
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to Security
Dr. Ahmed Al Zaidy
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
ANIKETKUMARSHARMA3
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Network security policies
Network security policiesNetwork security policies
Network security policiesUsman Mukhtar
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 
Security tools
Security toolsSecurity tools
Security tools
arfan shahzad
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
Phishing
PhishingPhishing
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
Entrance Exam Info
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 

What's hot (20)

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to Security
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Network security
Network securityNetwork security
Network security
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Security tools
Security toolsSecurity tools
Security tools
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Phishing
PhishingPhishing
Phishing
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Data protection and security

Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
Anjan Mahanta
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
Surajsingh809614
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
Avani Patel
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
TuhinUtsabPaul
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
Kirti Verma
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
DjTechs
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
Nithilan1
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
Geoffrey Vaughan
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
WindstoneHealth
 
Cyber security
Cyber security Cyber security
Cyber security
ZwebaButt
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
Brian Pichman
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
BHUt6
 

Similar to Data protection and security (20)

Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cyber security
Cyber security Cyber security
Cyber security
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 

More from samina khan

UNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptxUNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptx
samina khan
 
INFORMATION TECHNOLOGY.pptx
INFORMATION TECHNOLOGY.pptxINFORMATION TECHNOLOGY.pptx
INFORMATION TECHNOLOGY.pptx
samina khan
 
scaffolding in teaching.pptx
scaffolding in teaching.pptxscaffolding in teaching.pptx
scaffolding in teaching.pptx
samina khan
 
REFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptxREFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptx
samina khan
 
PEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptxPEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptx
samina khan
 
What is an Autobiography?
 What is an Autobiography? What is an Autobiography?
What is an Autobiography?
samina khan
 
Picture description
Picture descriptionPicture description
Picture description
samina khan
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
samina khan
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
samina khan
 
Computer logic and gates
Computer logic and gatesComputer logic and gates
Computer logic and gates
samina khan
 
Problem solving
Problem solvingProblem solving
Problem solving
samina khan
 
Computer networks
Computer networksComputer networks
Computer networks
samina khan
 
Classroom management
Classroom managementClassroom management
Classroom management
samina khan
 
More on number system
More on number systemMore on number system
More on number system
samina khan
 
Stress management
Stress managementStress management
Stress management
samina khan
 
Classroom management
Classroom managementClassroom management
Classroom management
samina khan
 
The future of technology
The future of technologyThe future of technology
The future of technology
samina khan
 
Lesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numbersLesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numbers
samina khan
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7
samina khan
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
samina khan
 

More from samina khan (20)

UNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptxUNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptx
 
INFORMATION TECHNOLOGY.pptx
INFORMATION TECHNOLOGY.pptxINFORMATION TECHNOLOGY.pptx
INFORMATION TECHNOLOGY.pptx
 
scaffolding in teaching.pptx
scaffolding in teaching.pptxscaffolding in teaching.pptx
scaffolding in teaching.pptx
 
REFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptxREFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptx
 
PEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptxPEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptx
 
What is an Autobiography?
 What is an Autobiography? What is an Autobiography?
What is an Autobiography?
 
Picture description
Picture descriptionPicture description
Picture description
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Computer logic and gates
Computer logic and gatesComputer logic and gates
Computer logic and gates
 
Problem solving
Problem solvingProblem solving
Problem solving
 
Computer networks
Computer networksComputer networks
Computer networks
 
Classroom management
Classroom managementClassroom management
Classroom management
 
More on number system
More on number systemMore on number system
More on number system
 
Stress management
Stress managementStress management
Stress management
 
Classroom management
Classroom managementClassroom management
Classroom management
 
The future of technology
The future of technologyThe future of technology
The future of technology
 
Lesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numbersLesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numbers
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
 

Recently uploaded

Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 

Recently uploaded (20)

Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 

Data protection and security

  • 1. 12/3/2019 1 Samina khan Fazaia Degree College Risalpur
  • 2. • Chapter 1 More on Number System • Chapter 2 Working on Word • Chapter 3 Working with Spreadsheet • Chapter 4 Problem solving • Chapter 5 Introduction to programming • Chapter 6 Programming in GW-BASIC • Chapter 7 Data verification & validation • Chapter 8 Data protection & security • Chapter 9 Applications of computers • Chapter 11 The future of Technology • Chapter 12 Creating webpages 12/3/2019 2
  • 4.
  • 5. What is data protection and security? • Being connected to the internet involves sharing a lot of information. • We disclose our address, bank account number, and credit card number when we shop online. • All of this information is personal. It should not be shown to any unconcerned person. • Both businesses and users suffer because of poor information security. • Your personal data might reveal things that you would not like to disclose to the general public.
  • 6. Continued… • This information can be stolen from a business’s database. This data can be used to harass people, commit fraud and engage in other criminal activities. • It is important for the businesses to protect their customers’ data from being stolen or misused.
  • 7. Common security issues • Problem of data security has grown up due to sharing of information on internet. • Some of them are internet fraud & viruses.
  • 8. Data Privacy • Some information are private and we don’t like to disclose it to people we don’t know personally. • Such information include our address, telephone number, password and bank account number. • Data privacy involves protecting information and allowing access to relevant people only. • Businesses need to keep their customer data secure and keep password secret or asking you a secret question.
  • 9. Identity theft • Identity thief gain access to a person’s personal information without his knowledge. • Such personal information are password, credit card number, bank account number etc. • He can use such information to commit crime. When the police try to trace the criminal, they end up arresting the person whose identity was stolen.
  • 10. Continued… • Employees who are fired from their jobs might steal the personal data of customer as a form of revenge against the company . • Some thieves might use this information to purchase items and then charge them to the original person’s credit card without his knowledge.
  • 11. Data Integrity • Three attributes of data integrity are: 1. Complete 2. Accurate 3. Sensible
  • 12. Continued… • When an unauthorized user gain access to data and change it, it loses its integrity. • They might delete some information or add incorrect information. • This happens very commonly on websites. Therefore, it is important to protect information from any unauthorized changes.
  • 13. FORMS OF SECURITY THREATS
  • 14. Forms of security threats • Threats to data privacy, identity and integrity can take several forms. • We should know about these forms. • Some of them are: 1. Internet fraud 2. Hacking 3. Phishing 4. Adware & spyware
  • 15. Internet Fraud • Fraud happens when a person cheats another for some financial gain. it is quite common in business. • Internet fraud take place online and it is very easy because buyers and sellers cannot see each other or meet personally. • Internet fraud can take the form of scams.
  • 16. Continued… • A scam is committed when a person promises to give out huge prizes to the people who provide their personal details on a website or through email. However, after providing personal data, they receive nothing. • The fraudster disappears with all their personal information and cannot be caught. • He might then use that information to commit crimes.
  • 17. Hacking • Hackers are people who gain access to a computer without the knowledge of the original user. • He can steal the data or can change it. • Hackers usually target e-commerce websites and online banking websites. • A hacker might hack a system to steal money and information, or just for fun.
  • 18. Phishing • It is an illegal activity. It happens when someone pretends to be a reliable organization, such as a bank, to obtain personal information. • The phisher creates a website similar to the website of an actual bank. The phisher then sends email messages to the customers of the actual bank asking them to visit the phisher’s website. • The customers give away their personal information such as their bank account number. The phisher can misuse this information.
  • 19. Adware and spyware • Adware is a type of software that is annoying but harmless. • When a user visit a webite , adware display pop- up advertisements on the computer screen. • Sometimes adware runs with another type of software called spyware. • Spyware monitors the websites the user visit. • It sends the information to a pre-defined source.
  • 20. Continued… • That source can then misuse that information or sell them to the interested parties, such as owner of the websites. • The owners use this information to make their website more interesting because they know what type of websites different users visit.
  • 21. Sources of security threats • Some sources of security threats are: • Computer viruses • Trojan horse • Worms • We can protect our data from such threats I we know where these threats come from.
  • 22. Common modes of security threats • We know where threats to data security come from. We also know how the virus, worm and Trojan horse enter our system. • That help us to create barriers that prevent them from infecting our computers. • Common modes of security threats are: 1. Infected drives and devices 2. Email attachments 3. Unsecured websites 4. Pirated software
  • 23. Infected drives and devices • Viruses can infect any kind of device such as hard disk, CD,USB etc. When we connect this device to other computer, the computer get infected too. • Viruses destroy data stored on the computer or cause it to malfunction. • We should avoid using portable storage devices from unknown sources and should install an antivirus program.
  • 24. Email attachments • Some internet users circulate a virus infected email messages that can cause harm to computer system and result in loss of data when the user click on email attachment . • We can avoid this by only opening email sent by people we know.
  • 25. Unsecured websites • Each website offers contents that attracts user. • These users might also include hackers. They might hack these websites so that any personal data that users provide to the website is redirected to the hackers. • Website should maintain high security levels and users should think twice before giving away personal information to anyone on internet
  • 26. Pirated software • Most companies require users to pay a certain amount of money as licensing fee before installing and using their software. • If a user obtain that software from some other source and start using it without paying, this s called software piracy. • Pirated software is a copied software from a local computer vendor. Most of the time the vendor’s computer is virus infected and that virus being transferred to the CD and would be transferred to our computer.
  • 27. Antivirus Software • Computer viruses are extremely dangerous for the computer and the information stored on it. • Antivirus programs have been designed to prevent viruses from affecting our data. • They detect computer viruses and make them ineffective. • A virus is a program written in some programming language. When this program is represented in machine code, it is called virus definition.
  • 28. Continued… • Antivirus software contains a store of several virus definitions. • To identify a virus that has infected the computer, it matches its code to virus definition stored in its database. • An antivirus can only control a virus if the virus definition is stored in its database.
  • 29. • New viruses are being created all the time. It is impossible for a single antivirus to have all possible virus definition in its database. • It is important to update an antivirus on regular basis to add new virus definition in its database. Continued…