SlideShare a Scribd company logo
1 of 9
Security measures mean the precautionary measures
taken toward possible danger or damage. There are 6
types of security measures :-
 1) DATA BACKUP
     -Data Backup is a program of file duplication. Backups of
     data applications are necessary so that they can be
     recovered in case of an emergency.
2) CRYPTOGRAPHY
    -Cryptography is a process of hiding information by altering
    the actual information into different representation.
 3) ANTIVIRUS
  -An antivirus program protects a computer against viruses by
  identifying and removing any computer viruses found in the
  computer memory.
4) ANTI-SPYWARE

-Spyware is a program placed on a computer without the
user’s knowledge. It secretly collects information about the user.

5) FIREWALL

-Firewall is a piece of hardware or software which functions in a
networked environment to prevent some communications
forbidden by the security policy.

6) HUMAN ASPECTS OF SECURITY MEASURES

- Human aspects refer to the user and also the intruder of a
computer system. It is one of the hardest aspects to give
protection to.
-Authentication is a process where users verify that
they are who they say they are.

TWO TYPE AUTHENTICATION :-
       1) CALLBACK SYSTEM
       2) BIOMETRICS DEVICES
-A callback system connects a user to a computer only after the
computer calls the user back at a previously established
telephone number.

To started the callback system :-

1)The user calls the computer and then enter the
   correct username and password.

2)The computer instructs the user to hang up and then
calls the user back.
-Biometrics is the science and technology of measuring
and analyzing biological data.




-FINGERPRINTS RECOGNITION
They are also readily accessible and
require little physical space either for the
reading hardware or the stored data.
-FACE RECOGNITION
Uses distinctive facial features, including
upper outlines of eye sockets, areas around
cheekbones, the sides of the mouth and the
location of the nose and eyes.


- VOICE RECOGNITION

The idea is to verify the individual speaker
against a stored voice pattern, not to
understand what is being said.


  - SIGNATURE DYNAMIC
 Based on an individual's signature, but
 considered unforgettable because what is
 recorded isn't the final image but how it is
 produced .
- Security Measures is very important to protect
our computer data .
-Biometric technology is now being used in
almost every area. Not only that, but various
types of biometric systems are being used to
achieve various functionalities.
-http://myictdotnet.blogspot.com/2009/01/l18-security-
measures.html
-http://www.wong-sir.com/cit/social_impacts/callback_system.
htm

-http://myictdotnet.blogspot.com/search?updated-
min=2008-01-01T00:00:00-08:00&updated-max=2009-01-
01T00:00:00-08:00&max-results=10

-http://www.computerworld.com/s/article/44257/
Authentication

More Related Content

What's hot

Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2smktsj2
 
Data Center Security
Data Center SecurityData Center Security
Data Center Securitydevalnaik
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.Arijit Ghosh
 
Use of technology
Use of technologyUse of technology
Use of technologyTamona1
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information SystemDaryl Conson
 
Computer Use Policy EK Computers
Computer Use Policy EK ComputersComputer Use Policy EK Computers
Computer Use Policy EK ComputersKirstin Long
 
computer security and its relationship to computer forensic
 computer security and its relationship to computer forensic computer security and its relationship to computer forensic
computer security and its relationship to computer forensicShabnamkhan113
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System SecurityAdel Barkam
 
Security in an embedded system
Security in an embedded system Security in an embedded system
Security in an embedded system UrmilasSrinivasan
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterpriseAbha Damani
 
operation security
operation securityoperation security
operation securityKajalsing23
 
Keamanan informasi
Keamanan informasiKeamanan informasi
Keamanan informasiNova Novelia
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
 
Okara history and security slides 2017
Okara history and security slides 2017Okara history and security slides 2017
Okara history and security slides 2017TAIMOOR KHAQAN
 

What's hot (19)

Hardware security
Hardware securityHardware security
Hardware security
 
I0516064
I0516064I0516064
I0516064
 
Physical security
Physical securityPhysical security
Physical security
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
 
Use of technology
Use of technologyUse of technology
Use of technology
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Computer Use Policy EK Computers
Computer Use Policy EK ComputersComputer Use Policy EK Computers
Computer Use Policy EK Computers
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
computer security and its relationship to computer forensic
 computer security and its relationship to computer forensic computer security and its relationship to computer forensic
computer security and its relationship to computer forensic
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System Security
 
Security in an embedded system
Security in an embedded system Security in an embedded system
Security in an embedded system
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterprise
 
operation security
operation securityoperation security
operation security
 
Isaca tech session 19 feb 2013 securing mobile devices rev
Isaca tech session 19 feb 2013   securing mobile devices revIsaca tech session 19 feb 2013   securing mobile devices rev
Isaca tech session 19 feb 2013 securing mobile devices rev
 
Keamanan informasi
Keamanan informasiKeamanan informasi
Keamanan informasi
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Okara history and security slides 2017
Okara history and security slides 2017Okara history and security slides 2017
Okara history and security slides 2017
 

Similar to Security measure

Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjripublishers Ijri
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
Important keyword to remember
Important keyword to rememberImportant keyword to remember
Important keyword to rememberIszamli Jailani
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
It security
It securityIt security
It securityavi2607
 
Mobile Device Protection Using Sensors
Mobile Device Protection Using SensorsMobile Device Protection Using Sensors
Mobile Device Protection Using SensorsEditor IJCATR
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measureshazirma
 
Nota Padat ICT SPM
Nota Padat ICT SPMNota Padat ICT SPM
Nota Padat ICT SPMD.J Md Thani
 
Information security questions
Information security questions Information security questions
Information security questions gamemaker762
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systemsaissa benyahya
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET Journal
 
Module 5 security
Module 5   securityModule 5   security
Module 5 securityIT
 

Similar to Security measure (20)

Unit v
Unit vUnit v
Unit v
 
Notacd02
Notacd02Notacd02
Notacd02
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Important keyword to remember
Important keyword to rememberImportant keyword to remember
Important keyword to remember
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
It security
It securityIt security
It security
 
Mobile Device Protection Using Sensors
Mobile Device Protection Using SensorsMobile Device Protection Using Sensors
Mobile Device Protection Using Sensors
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
Nota Padat ICT SPM
Nota Padat ICT SPMNota Padat ICT SPM
Nota Padat ICT SPM
 
Information security questions
Information security questions Information security questions
Information security questions
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Methods
MethodsMethods
Methods
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 

Security measure

  • 1.
  • 2. Security measures mean the precautionary measures taken toward possible danger or damage. There are 6 types of security measures :- 1) DATA BACKUP -Data Backup is a program of file duplication. Backups of data applications are necessary so that they can be recovered in case of an emergency. 2) CRYPTOGRAPHY -Cryptography is a process of hiding information by altering the actual information into different representation. 3) ANTIVIRUS -An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in the computer memory.
  • 3. 4) ANTI-SPYWARE -Spyware is a program placed on a computer without the user’s knowledge. It secretly collects information about the user. 5) FIREWALL -Firewall is a piece of hardware or software which functions in a networked environment to prevent some communications forbidden by the security policy. 6) HUMAN ASPECTS OF SECURITY MEASURES - Human aspects refer to the user and also the intruder of a computer system. It is one of the hardest aspects to give protection to.
  • 4. -Authentication is a process where users verify that they are who they say they are. TWO TYPE AUTHENTICATION :- 1) CALLBACK SYSTEM 2) BIOMETRICS DEVICES
  • 5. -A callback system connects a user to a computer only after the computer calls the user back at a previously established telephone number. To started the callback system :- 1)The user calls the computer and then enter the correct username and password. 2)The computer instructs the user to hang up and then calls the user back.
  • 6. -Biometrics is the science and technology of measuring and analyzing biological data. -FINGERPRINTS RECOGNITION They are also readily accessible and require little physical space either for the reading hardware or the stored data.
  • 7. -FACE RECOGNITION Uses distinctive facial features, including upper outlines of eye sockets, areas around cheekbones, the sides of the mouth and the location of the nose and eyes. - VOICE RECOGNITION The idea is to verify the individual speaker against a stored voice pattern, not to understand what is being said. - SIGNATURE DYNAMIC Based on an individual's signature, but considered unforgettable because what is recorded isn't the final image but how it is produced .
  • 8. - Security Measures is very important to protect our computer data . -Biometric technology is now being used in almost every area. Not only that, but various types of biometric systems are being used to achieve various functionalities.