SlideShare a Scribd company logo
1 of 2
Download to read offline
now a days security is very important to organization and physical security and their
infrastructures are no exception and now a days hacking has become major threats like cyber
security or computer crimes .security is awareness that reduce misuse of computer threats and
the considerations should be taken into account in order for deciding which physical controls
should be implemented and their reasons are first thing we can protect the data from hackers by
using security controls like information security controls like technical , policy safeguards like
the law ie the data protection acts place an obligation on data controllers to have appropriate
security measures in place to prevent the unauthorised acces to or destruction of data or
accidental loss of data and we should do this by providing appropriate level of security .
another one is providing access control ie a data controller should have limit to access the
personal data on need to know basis . access authentication ie users should have unique identifier
such as pass words to allow access to personal data and data controller should make sure that
their passwords should be unique and it should not disclose to anyone and these include not only
passwords but also smart card or token.Encryption is the process of encoding information stored
on device and further adding security and it is considered an essential security measure where
information is stored on portable device or transmitted over public network and by using
passwords we can decrypt the data.Mainly antivirus plays an major important role in protecting
the information by preventing the viruses that may also introduced from portable devices .
Firewalls plays a major important role in protecting the information from hackers as their major
duty is to prevent unauthorised access attempts and the importance of firewalls has increased in
organizations and individuals avail on internet connections . software patching are the latest
updates from the creator of your os and they usually contain fixes to potential security concerns
and can be important tool in preventing hacking and malware attacks .wireless network ie access
to server by means of wireless connection can expose network attacks . Human factor ie no
matter what people should not write passwords that related to information and prevent it from
hacking .backup systems are essential in preventing the destruction of information or loss of
data.logs and audit trails ie normally the system should identify the user name that access the file
and the time of access. IN This way we can protect the information from hacking by using this
preventive measures in protecting the information.
Solution
now a days security is very important to organization and physical security and their
infrastructures are no exception and now a days hacking has become major threats like cyber
security or computer crimes .security is awareness that reduce misuse of computer threats and
the considerations should be taken into account in order for deciding which physical controls
should be implemented and their reasons are first thing we can protect the data from hackers by
using security controls like information security controls like technical , policy safeguards like
the law ie the data protection acts place an obligation on data controllers to have appropriate
security measures in place to prevent the unauthorised acces to or destruction of data or
accidental loss of data and we should do this by providing appropriate level of security .
another one is providing access control ie a data controller should have limit to access the
personal data on need to know basis . access authentication ie users should have unique identifier
such as pass words to allow access to personal data and data controller should make sure that
their passwords should be unique and it should not disclose to anyone and these include not only
passwords but also smart card or token.Encryption is the process of encoding information stored
on device and further adding security and it is considered an essential security measure where
information is stored on portable device or transmitted over public network and by using
passwords we can decrypt the data.Mainly antivirus plays an major important role in protecting
the information by preventing the viruses that may also introduced from portable devices .
Firewalls plays a major important role in protecting the information from hackers as their major
duty is to prevent unauthorised access attempts and the importance of firewalls has increased in
organizations and individuals avail on internet connections . software patching are the latest
updates from the creator of your os and they usually contain fixes to potential security concerns
and can be important tool in preventing hacking and malware attacks .wireless network ie access
to server by means of wireless connection can expose network attacks . Human factor ie no
matter what people should not write passwords that related to information and prevent it from
hacking .backup systems are essential in preventing the destruction of information or loss of
data.logs and audit trails ie normally the system should identify the user name that access the file
and the time of access. IN This way we can protect the information from hacking by using this
preventive measures in protecting the information.

More Related Content

Similar to now a days security is very important to organization and physical s.pdf

Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx
Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docxRunning head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx
Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docxglendar3
 
Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx
Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docxRunning head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx
Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docxtodd581
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015Jeffery Brown
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Md Shaifullar Rabbi
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
A sneak peek into the top 5 network security solutions.docx
A sneak peek into the top 5 network security solutions.docxA sneak peek into the top 5 network security solutions.docx
A sneak peek into the top 5 network security solutions.docxNeilStark1
 
A sneak peek into the top 5 network security solutions.pdf
A sneak peek into the top 5 network security solutions.pdfA sneak peek into the top 5 network security solutions.pdf
A sneak peek into the top 5 network security solutions.pdfNeilStark1
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfNikhil Khunteta
 
Access system.docx
Access system.docxAccess system.docx
Access system.docxWaseelsultan
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Computing safety
Computing safetyComputing safety
Computing safetytitoferrus
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 

Similar to now a days security is very important to organization and physical s.pdf (20)

Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx
Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docxRunning head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx
Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx
 
Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx
Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docxRunning head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx
Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
A sneak peek into the top 5 network security solutions.docx
A sneak peek into the top 5 network security solutions.docxA sneak peek into the top 5 network security solutions.docx
A sneak peek into the top 5 network security solutions.docx
 
A sneak peek into the top 5 network security solutions.pdf
A sneak peek into the top 5 network security solutions.pdfA sneak peek into the top 5 network security solutions.pdf
A sneak peek into the top 5 network security solutions.pdf
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Access system.docx
Access system.docxAccess system.docx
Access system.docx
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Computing safety
Computing safetyComputing safety
Computing safety
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
I0516064
I0516064I0516064
I0516064
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 

More from sooryasalini

Polarity is measured on a scale of electronegativ.pdf
                     Polarity is measured on a scale of electronegativ.pdf                     Polarity is measured on a scale of electronegativ.pdf
Polarity is measured on a scale of electronegativ.pdfsooryasalini
 
Geometric isomers are a subset of stereoisomers. .pdf
                     Geometric isomers are a subset of stereoisomers. .pdf                     Geometric isomers are a subset of stereoisomers. .pdf
Geometric isomers are a subset of stereoisomers. .pdfsooryasalini
 
Scientists Contributions Stanley Miller Conducted an experiment .pdf
    Scientists Contributions   Stanley Miller Conducted an experiment .pdf    Scientists Contributions   Stanley Miller Conducted an experiment .pdf
Scientists Contributions Stanley Miller Conducted an experiment .pdfsooryasalini
 
1) Microfinance is the provision of small-scale financial services t.pdf
1) Microfinance is the provision of small-scale financial services t.pdf1) Microfinance is the provision of small-scale financial services t.pdf
1) Microfinance is the provision of small-scale financial services t.pdfsooryasalini
 
The components of individual health are as followsThe three compon.pdf
The components of individual health are as followsThe three compon.pdfThe components of individual health are as followsThe three compon.pdf
The components of individual health are as followsThe three compon.pdfsooryasalini
 
-Lower income households have become more concentrated in U.S. centr.pdf
-Lower income households have become more concentrated in U.S. centr.pdf-Lower income households have become more concentrated in U.S. centr.pdf
-Lower income households have become more concentrated in U.S. centr.pdfsooryasalini
 
NO+ note O has one more electron then N, thus, .pdf
                     NO+  note O has one more electron then N, thus, .pdf                     NO+  note O has one more electron then N, thus, .pdf
NO+ note O has one more electron then N, thus, .pdfsooryasalini
 
Yes, we should be very suspicious of the bones authenticity. This .pdf
Yes, we should be very suspicious of the bones authenticity. This .pdfYes, we should be very suspicious of the bones authenticity. This .pdf
Yes, we should be very suspicious of the bones authenticity. This .pdfsooryasalini
 
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdfWHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdfsooryasalini
 
Web 3.0 is just how, why and at what time.Web serviceis a software.pdf
Web 3.0 is just how, why and at what time.Web serviceis a software.pdfWeb 3.0 is just how, why and at what time.Web serviceis a software.pdf
Web 3.0 is just how, why and at what time.Web serviceis a software.pdfsooryasalini
 
There are a few different reagent could be used to perform this tran.pdf
There are a few different reagent could be used to perform this tran.pdfThere are a few different reagent could be used to perform this tran.pdf
There are a few different reagent could be used to perform this tran.pdfsooryasalini
 
5.Write the VHDL code for the state machine.library ieee;use i.pdf
5.Write the VHDL code for the state machine.library ieee;use i.pdf5.Write the VHDL code for the state machine.library ieee;use i.pdf
5.Write the VHDL code for the state machine.library ieee;use i.pdfsooryasalini
 
pH = pKa + log([A-][HA])(base) HONH2 + H2O (acid) HONH3+ + OH-.pdf
pH = pKa + log([A-][HA])(base) HONH2 + H2O  (acid) HONH3+ + OH-.pdfpH = pKa + log([A-][HA])(base) HONH2 + H2O  (acid) HONH3+ + OH-.pdf
pH = pKa + log([A-][HA])(base) HONH2 + H2O (acid) HONH3+ + OH-.pdfsooryasalini
 
Solution Relation between carpels and locules Carpels is the p.pdf
Solution Relation between carpels and locules Carpels is the p.pdfSolution Relation between carpels and locules Carpels is the p.pdf
Solution Relation between carpels and locules Carpels is the p.pdfsooryasalini
 
Solution.Providing legal advice to the president of the company co.pdf
Solution.Providing legal advice to the president of the company co.pdfSolution.Providing legal advice to the president of the company co.pdf
Solution.Providing legal advice to the president of the company co.pdfsooryasalini
 
S and Se are 6th group elementsSize increase the leaving nature in.pdf
S and Se are 6th group elementsSize increase the leaving nature in.pdfS and Se are 6th group elementsSize increase the leaving nature in.pdf
S and Se are 6th group elementsSize increase the leaving nature in.pdfsooryasalini
 
Please refer this solution. This is working file for IntegersHeade.pdf
Please refer this solution. This is working file for IntegersHeade.pdfPlease refer this solution. This is working file for IntegersHeade.pdf
Please refer this solution. This is working file for IntegersHeade.pdfsooryasalini
 
Simple DefinationsIntertidal zone is the area that is above wate.pdf
Simple DefinationsIntertidal zone  is the area that is above wate.pdfSimple DefinationsIntertidal zone  is the area that is above wate.pdf
Simple DefinationsIntertidal zone is the area that is above wate.pdfsooryasalini
 
Production.javapublic class Production {    Declaring instance.pdf
Production.javapublic class Production {    Declaring instance.pdfProduction.javapublic class Production {    Declaring instance.pdf
Production.javapublic class Production {    Declaring instance.pdfsooryasalini
 
Proteobacteria are major phylum of gram negative bacteria. Major gro.pdf
Proteobacteria are major phylum of gram negative bacteria. Major gro.pdfProteobacteria are major phylum of gram negative bacteria. Major gro.pdf
Proteobacteria are major phylum of gram negative bacteria. Major gro.pdfsooryasalini
 

More from sooryasalini (20)

Polarity is measured on a scale of electronegativ.pdf
                     Polarity is measured on a scale of electronegativ.pdf                     Polarity is measured on a scale of electronegativ.pdf
Polarity is measured on a scale of electronegativ.pdf
 
Geometric isomers are a subset of stereoisomers. .pdf
                     Geometric isomers are a subset of stereoisomers. .pdf                     Geometric isomers are a subset of stereoisomers. .pdf
Geometric isomers are a subset of stereoisomers. .pdf
 
Scientists Contributions Stanley Miller Conducted an experiment .pdf
    Scientists Contributions   Stanley Miller Conducted an experiment .pdf    Scientists Contributions   Stanley Miller Conducted an experiment .pdf
Scientists Contributions Stanley Miller Conducted an experiment .pdf
 
1) Microfinance is the provision of small-scale financial services t.pdf
1) Microfinance is the provision of small-scale financial services t.pdf1) Microfinance is the provision of small-scale financial services t.pdf
1) Microfinance is the provision of small-scale financial services t.pdf
 
The components of individual health are as followsThe three compon.pdf
The components of individual health are as followsThe three compon.pdfThe components of individual health are as followsThe three compon.pdf
The components of individual health are as followsThe three compon.pdf
 
-Lower income households have become more concentrated in U.S. centr.pdf
-Lower income households have become more concentrated in U.S. centr.pdf-Lower income households have become more concentrated in U.S. centr.pdf
-Lower income households have become more concentrated in U.S. centr.pdf
 
NO+ note O has one more electron then N, thus, .pdf
                     NO+  note O has one more electron then N, thus, .pdf                     NO+  note O has one more electron then N, thus, .pdf
NO+ note O has one more electron then N, thus, .pdf
 
Yes, we should be very suspicious of the bones authenticity. This .pdf
Yes, we should be very suspicious of the bones authenticity. This .pdfYes, we should be very suspicious of the bones authenticity. This .pdf
Yes, we should be very suspicious of the bones authenticity. This .pdf
 
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdfWHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
 
Web 3.0 is just how, why and at what time.Web serviceis a software.pdf
Web 3.0 is just how, why and at what time.Web serviceis a software.pdfWeb 3.0 is just how, why and at what time.Web serviceis a software.pdf
Web 3.0 is just how, why and at what time.Web serviceis a software.pdf
 
There are a few different reagent could be used to perform this tran.pdf
There are a few different reagent could be used to perform this tran.pdfThere are a few different reagent could be used to perform this tran.pdf
There are a few different reagent could be used to perform this tran.pdf
 
5.Write the VHDL code for the state machine.library ieee;use i.pdf
5.Write the VHDL code for the state machine.library ieee;use i.pdf5.Write the VHDL code for the state machine.library ieee;use i.pdf
5.Write the VHDL code for the state machine.library ieee;use i.pdf
 
pH = pKa + log([A-][HA])(base) HONH2 + H2O (acid) HONH3+ + OH-.pdf
pH = pKa + log([A-][HA])(base) HONH2 + H2O  (acid) HONH3+ + OH-.pdfpH = pKa + log([A-][HA])(base) HONH2 + H2O  (acid) HONH3+ + OH-.pdf
pH = pKa + log([A-][HA])(base) HONH2 + H2O (acid) HONH3+ + OH-.pdf
 
Solution Relation between carpels and locules Carpels is the p.pdf
Solution Relation between carpels and locules Carpels is the p.pdfSolution Relation between carpels and locules Carpels is the p.pdf
Solution Relation between carpels and locules Carpels is the p.pdf
 
Solution.Providing legal advice to the president of the company co.pdf
Solution.Providing legal advice to the president of the company co.pdfSolution.Providing legal advice to the president of the company co.pdf
Solution.Providing legal advice to the president of the company co.pdf
 
S and Se are 6th group elementsSize increase the leaving nature in.pdf
S and Se are 6th group elementsSize increase the leaving nature in.pdfS and Se are 6th group elementsSize increase the leaving nature in.pdf
S and Se are 6th group elementsSize increase the leaving nature in.pdf
 
Please refer this solution. This is working file for IntegersHeade.pdf
Please refer this solution. This is working file for IntegersHeade.pdfPlease refer this solution. This is working file for IntegersHeade.pdf
Please refer this solution. This is working file for IntegersHeade.pdf
 
Simple DefinationsIntertidal zone is the area that is above wate.pdf
Simple DefinationsIntertidal zone  is the area that is above wate.pdfSimple DefinationsIntertidal zone  is the area that is above wate.pdf
Simple DefinationsIntertidal zone is the area that is above wate.pdf
 
Production.javapublic class Production {    Declaring instance.pdf
Production.javapublic class Production {    Declaring instance.pdfProduction.javapublic class Production {    Declaring instance.pdf
Production.javapublic class Production {    Declaring instance.pdf
 
Proteobacteria are major phylum of gram negative bacteria. Major gro.pdf
Proteobacteria are major phylum of gram negative bacteria. Major gro.pdfProteobacteria are major phylum of gram negative bacteria. Major gro.pdf
Proteobacteria are major phylum of gram negative bacteria. Major gro.pdf
 

Recently uploaded

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

now a days security is very important to organization and physical s.pdf

  • 1. now a days security is very important to organization and physical security and their infrastructures are no exception and now a days hacking has become major threats like cyber security or computer crimes .security is awareness that reduce misuse of computer threats and the considerations should be taken into account in order for deciding which physical controls should be implemented and their reasons are first thing we can protect the data from hackers by using security controls like information security controls like technical , policy safeguards like the law ie the data protection acts place an obligation on data controllers to have appropriate security measures in place to prevent the unauthorised acces to or destruction of data or accidental loss of data and we should do this by providing appropriate level of security . another one is providing access control ie a data controller should have limit to access the personal data on need to know basis . access authentication ie users should have unique identifier such as pass words to allow access to personal data and data controller should make sure that their passwords should be unique and it should not disclose to anyone and these include not only passwords but also smart card or token.Encryption is the process of encoding information stored on device and further adding security and it is considered an essential security measure where information is stored on portable device or transmitted over public network and by using passwords we can decrypt the data.Mainly antivirus plays an major important role in protecting the information by preventing the viruses that may also introduced from portable devices . Firewalls plays a major important role in protecting the information from hackers as their major duty is to prevent unauthorised access attempts and the importance of firewalls has increased in organizations and individuals avail on internet connections . software patching are the latest updates from the creator of your os and they usually contain fixes to potential security concerns and can be important tool in preventing hacking and malware attacks .wireless network ie access to server by means of wireless connection can expose network attacks . Human factor ie no matter what people should not write passwords that related to information and prevent it from hacking .backup systems are essential in preventing the destruction of information or loss of data.logs and audit trails ie normally the system should identify the user name that access the file and the time of access. IN This way we can protect the information from hacking by using this preventive measures in protecting the information. Solution now a days security is very important to organization and physical security and their infrastructures are no exception and now a days hacking has become major threats like cyber security or computer crimes .security is awareness that reduce misuse of computer threats and
  • 2. the considerations should be taken into account in order for deciding which physical controls should be implemented and their reasons are first thing we can protect the data from hackers by using security controls like information security controls like technical , policy safeguards like the law ie the data protection acts place an obligation on data controllers to have appropriate security measures in place to prevent the unauthorised acces to or destruction of data or accidental loss of data and we should do this by providing appropriate level of security . another one is providing access control ie a data controller should have limit to access the personal data on need to know basis . access authentication ie users should have unique identifier such as pass words to allow access to personal data and data controller should make sure that their passwords should be unique and it should not disclose to anyone and these include not only passwords but also smart card or token.Encryption is the process of encoding information stored on device and further adding security and it is considered an essential security measure where information is stored on portable device or transmitted over public network and by using passwords we can decrypt the data.Mainly antivirus plays an major important role in protecting the information by preventing the viruses that may also introduced from portable devices . Firewalls plays a major important role in protecting the information from hackers as their major duty is to prevent unauthorised access attempts and the importance of firewalls has increased in organizations and individuals avail on internet connections . software patching are the latest updates from the creator of your os and they usually contain fixes to potential security concerns and can be important tool in preventing hacking and malware attacks .wireless network ie access to server by means of wireless connection can expose network attacks . Human factor ie no matter what people should not write passwords that related to information and prevent it from hacking .backup systems are essential in preventing the destruction of information or loss of data.logs and audit trails ie normally the system should identify the user name that access the file and the time of access. IN This way we can protect the information from hacking by using this preventive measures in protecting the information.