Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.

Similar presentations


Presentation on theme: "1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage."— Presentation transcript:

1 1 UNIT 19 Data Security 2

2 Introduction 2

3 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage techniques on networks 3

4 Hardware and Software protection There are a variety of security measures that can be used to protect hardware and software including: 1)Controlling the physical access to hardware and software. 2)Backing up data and programs: storing a copy of files on a storage device to keep them safe. 3)Implementing network controls such as: A.Using passwords (a secret code used to control access to a network system).

5 B.Installing a firewall (a combination of hardware and software used to control the data going into and out of a network. It is used to prevent unauthorized access to the network by hackers). C.Encrypting data (protecting data by putting it in a form only authorized users can understand). Hardware and Software protection (and Network protection)

6 D.Installing a callback system ( a system that automatically disconnects a telephone line after receiving a call and then dials the telephone number of the system that made the call, to reconnect the line. It is used in remote access systems to make sure that connections can only be made from permitted telephone numbers). E.Using signature verification or biometric security devices. Hardware and Software protection (and Network protection)

7 4) Separating and rotating the computing functions carried out by employees and carrying out periodic audits of the system (observing and recording events on the network systematically). Hardware and Software protection (and Network protection)

8 5) Protecting against natural disasters by installing uninterruptible power supplies and surge protectors. battery backup systems that automatically provide power to a computer when the normal electricity source fails. Electronic devices that protect equipment from damage due to a sudden surge in a power supply Hardware and Software protection

9 6)Protecting against viruses by using anti virus programs and ensuring that all software is free of viruses before it is installed. Particular care should be taken when using public domain software (freeware) and shareware. An anti-virus program is a program that checks files for virus coding instructions inside another program and can be used for removing any virus coding instructions detected. computer programs or sets of programs used to detect, identify and remove viruses from a computer system Hardware and Software protection

10 A smart card is a plastic card containing a processor and a memory chip. It can be used to store large amounts of confidential data including coded data that can be used as digital cash. Electronic currency that is used for making electronic purchases over the Internet Some authentication technologies (smart card)

11 It can also be used as a security device to prevent or allow access to a system and allow the user to withdraw cash from a bank ATM. Automatic Teller Machine- a type of machine used by banks for enabling customers to withdraw money from their bank accounts. Some authentication technologies (smart card)

12 A smart card reader is a device used for reading smart cards by detecting radio signals emitted from a radio antenna in the form of a small coil inside the smart card. Some authentication technologies (smart card)

13 Data is commonly stored on a LAN (Local Area Network) by attaching storage devices to a server. Common storage devices include tape drives, RAID and optical devices such as CD-Roms. A computer that provides a network service A set of hard disks that work as one unit Storage techniques on networks

14 In large networks, server farms are used. The storage devices are often attached using a connection standard known as SCSI (Small Computer Systems Interface) LANs with larger storage needs can add NAS (Networked Attached Storage) devices. They attach to the LAN and are available to all systems on the LAN without needing to be attached to a server computer. Large collections of networked server computers that work together by sharing the service workload Storage techniques on networks

15 The biggest network systems can also use a SAN (Storage Area Network). This is a storage network that uses high speed copper or fiber optic connections such as Fiber Channel (a high speed interconnection standard). The SAN is a separate network that is interconnected to the main LAN. It is therefore available to all LAN users and can be centrally managed. Storage techniques on networks


Download ppt "1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage."

Similar presentations


Ads by Google