SlideShare a Scribd company logo
Computer Concepts – Illustrated 8 th  edition Unit F: Data Security
Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition Computer Concepts – Illustrated 8th Edition
Objectives (continued) ,[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition Computer Concepts – Illustrated 8th Edition
Knowing What Can Go Wrong ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Knowing What Can Go Wrong (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Computer Concepts – Illustrated 8th Edition Figure F-3: Troubleshooting guidelines
Protecting Computer Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Computer Concepts – Illustrated 8th Edition Figure F-4: A locking device Figure F-5: A security plate
Protecting Computer Systems (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Understanding Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Computer Concepts – Illustrated 8th Edition Figure F-9: Retinal scans are a form of biometric authentication
Understanding Authentication (continued) ,[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Exploring Security Threats and Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Computer Concepts – Illustrated 8th Edition Figure F-13: A simulated worm attack
Exploring Security Threats and Malware (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Exploring Security Threats and Malware (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Avoiding Security Threats and Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Avoiding Security Threats and Malware (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Avoiding Security Threats and Malware (continued) ,[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Examining Network and Internet Access Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Examining Network and Internet Access Security (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Computer Concepts – Illustrated 8th Edition Figure F-20: Windows Firewall settings
Exploring Web and Email Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Computer Concepts – Illustrated 8th Edition Figure F-23: Anti-Spyware software
Exploring Web and Email Security (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Understanding Backups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Understanding Backups (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Talking Points: Prosecuting Computer Crime ,[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Talking Points: Prosecuting Computer Crime (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition Computer Concepts – Illustrated 8th Edition

More Related Content

What's hot

Os security issues
Os security issuesOs security issues
Os security issues
JOLLUSUDARSHANREDDY
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
Sejahtera Affif
 
O p
O pO p
Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
Operating system security (a brief)
Operating system security (a brief)Operating system security (a brief)
Operating system security (a brief)
cnokia
 
OSCh19
OSCh19OSCh19
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
Ajit Gaddam
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
Deborah Obasogie
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
Vi Tính Hoàng Nam
 
Ch11
Ch11Ch11
File000148
File000148File000148
File000148
Desmond Devendran
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
أحلام انصارى
 
Protection
ProtectionProtection
Lecture 4
Lecture 4Lecture 4
Lecture 4
Education
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
Wayne Jones Jnr
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating system
G Prachi
 
OSCh18
OSCh18OSCh18
Computer Literacy Lesson 31
Computer Literacy Lesson 31Computer Literacy Lesson 31
Computer Literacy Lesson 31
cpashke
 
Hardware security
Hardware securityHardware security
Hardware security
RajKumar4943
 

What's hot (19)

Os security issues
Os security issuesOs security issues
Os security issues
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
 
O p
O pO p
O p
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Operating system security (a brief)
Operating system security (a brief)Operating system security (a brief)
Operating system security (a brief)
 
OSCh19
OSCh19OSCh19
OSCh19
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
Ch11
Ch11Ch11
Ch11
 
File000148
File000148File000148
File000148
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Protection
ProtectionProtection
Protection
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating system
 
OSCh18
OSCh18OSCh18
OSCh18
 
Computer Literacy Lesson 31
Computer Literacy Lesson 31Computer Literacy Lesson 31
Computer Literacy Lesson 31
 
Hardware security
Hardware securityHardware security
Hardware security
 

Viewers also liked

Fast-Teks 20 ways to protect your computer
Fast-Teks 20 ways to protect your computer Fast-Teks 20 ways to protect your computer
Fast-Teks 20 ways to protect your computer
santlou
 
Emerging Risk - Syed Anser Hussain Naqvi
Emerging Risk - Syed Anser Hussain NaqviEmerging Risk - Syed Anser Hussain Naqvi
Emerging Risk - Syed Anser Hussain Naqvi
Protagonistsoldier
 
Security and protection
Security and protectionSecurity and protection
Security and protection
Nital Shingala
 
Chapter 15 - Security
Chapter 15 - SecurityChapter 15 - Security
Chapter 15 - Security
Wayne Jones Jnr
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
Lee Ray
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
EMBplc.com
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
Oles Seheda
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (13)

Fast-Teks 20 ways to protect your computer
Fast-Teks 20 ways to protect your computer Fast-Teks 20 ways to protect your computer
Fast-Teks 20 ways to protect your computer
 
Emerging Risk - Syed Anser Hussain Naqvi
Emerging Risk - Syed Anser Hussain NaqviEmerging Risk - Syed Anser Hussain Naqvi
Emerging Risk - Syed Anser Hussain Naqvi
 
Security and protection
Security and protectionSecurity and protection
Security and protection
 
Chapter 15 - Security
Chapter 15 - SecurityChapter 15 - Security
Chapter 15 - Security
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Unit F Data Security

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
MISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
MISY
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
Wollo UNiversity
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
Khristine Botin
 
Computer security
Computer securityComputer security
Computer security
Merma Niña Callanta
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
wolverine0614
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
IT
 
Chapter11
Chapter11Chapter11
Chapter11
Izaham
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
Somesh Kumar
 
Insecurity vssut
Insecurity vssutInsecurity vssut
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
Asif Raza
 
Computer security
Computer securityComputer security
Computer security
Dhani Ahmad
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
 
Computer security
Computer securityComputer security
Computer security
fiza1975
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
Yhal Htet Aung
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
bora.gungoren
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
Information Technology
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
RamaNingaiah
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
Ian Dave Balatbat
 

Similar to Unit F Data Security (20)

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Computer security
Computer securityComputer security
Computer security
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 
Chapter11
Chapter11Chapter11
Chapter11
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Computer security
Computer securityComputer security
Computer security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Computer security
Computer securityComputer security
Computer security
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 

More from Chaffey College

Strings Objects Variables
Strings Objects VariablesStrings Objects Variables
Strings Objects Variables
Chaffey College
 
Ruby Chapter 2
Ruby Chapter 2Ruby Chapter 2
Ruby Chapter 2
Chaffey College
 
Social networks and games
Social networks and gamesSocial networks and games
Social networks and games
Chaffey College
 
Serious games
Serious gamesSerious games
Serious games
Chaffey College
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
Chaffey College
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
Chaffey College
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
Chaffey College
 
The games factory 2 alien wars
The games factory 2 alien warsThe games factory 2 alien wars
The games factory 2 alien wars
Chaffey College
 
Target markets
Target marketsTarget markets
Target markets
Chaffey College
 
Ch 8 introduction to data structures
Ch 8 introduction to data structuresCh 8 introduction to data structures
Ch 8 introduction to data structures
Chaffey College
 
Ch 8 data structures in alice
Ch 8  data structures in aliceCh 8  data structures in alice
Ch 8 data structures in alice
Chaffey College
 
Ch 7 recursion
Ch 7 recursionCh 7 recursion
Ch 7 recursion
Chaffey College
 
Intro to gml
Intro to gmlIntro to gml
Intro to gml
Chaffey College
 
Power point unit d
Power point unit dPower point unit d
Power point unit d
Chaffey College
 
Power point unit c
Power point unit cPower point unit c
Power point unit c
Chaffey College
 
Power point unit b
Power point unit bPower point unit b
Power point unit b
Chaffey College
 
Power point unit a
Power point unit aPower point unit a
Power point unit a
Chaffey College
 
Gamegraphics
GamegraphicsGamegraphics
Gamegraphics
Chaffey College
 
Gamesound
GamesoundGamesound
Gamesound
Chaffey College
 
Ch 6 text and sound in alice
Ch 6 text and sound in aliceCh 6 text and sound in alice
Ch 6 text and sound in alice
Chaffey College
 

More from Chaffey College (20)

Strings Objects Variables
Strings Objects VariablesStrings Objects Variables
Strings Objects Variables
 
Ruby Chapter 2
Ruby Chapter 2Ruby Chapter 2
Ruby Chapter 2
 
Social networks and games
Social networks and gamesSocial networks and games
Social networks and games
 
Serious games
Serious gamesSerious games
Serious games
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
The games factory 2 alien wars
The games factory 2 alien warsThe games factory 2 alien wars
The games factory 2 alien wars
 
Target markets
Target marketsTarget markets
Target markets
 
Ch 8 introduction to data structures
Ch 8 introduction to data structuresCh 8 introduction to data structures
Ch 8 introduction to data structures
 
Ch 8 data structures in alice
Ch 8  data structures in aliceCh 8  data structures in alice
Ch 8 data structures in alice
 
Ch 7 recursion
Ch 7 recursionCh 7 recursion
Ch 7 recursion
 
Intro to gml
Intro to gmlIntro to gml
Intro to gml
 
Power point unit d
Power point unit dPower point unit d
Power point unit d
 
Power point unit c
Power point unit cPower point unit c
Power point unit c
 
Power point unit b
Power point unit bPower point unit b
Power point unit b
 
Power point unit a
Power point unit aPower point unit a
Power point unit a
 
Gamegraphics
GamegraphicsGamegraphics
Gamegraphics
 
Gamesound
GamesoundGamesound
Gamesound
 
Ch 6 text and sound in alice
Ch 6 text and sound in aliceCh 6 text and sound in alice
Ch 6 text and sound in alice
 

Unit F Data Security