Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )

Slides:



Advertisements
Similar presentations
By: Jack, Anna, Cassidy and Patrick October 7, 2008.
Advertisements

Let’s Talk About Cyber Security
POSSIBLE THREATS TO DATA
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Video Following is a video of what can happen if you don’t update your security settings! security.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Unit 19 INTERNET SECURITY
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Viruses & Destructive Programs
Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification. Security.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
How to protect your computer By: Emily, Jackie and Kathleen.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
CONTENTS What is Virus ? Types of computer viruses.
Computer Skills and Applications Computer Security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Cyber Security By:Jerusa Miller July 7, What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer viruses are programs written by people and they are programed specially to damage the data on our computer by corrupting programs, deleting files,
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 3 Computing System Fundamentals 3.7 Utility Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Chapter 40 Internet Security.
COMPUTER VIRUSES Computer Technology.
How to Get Rid of Online Threats Impacting your Computer Device?
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Internet Safety and The Digital Divide
Faculty of Science IT Department By Raz Dara MA.
Presentation transcript:

Data Security

Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )

Natural disaster

Accidentals Destruction ( Hardware failure )

Back up Mostly protect data from natural disasters

Unauthorized Access

Passwords

Locks Some computers may have locks on them. Biometrics Locks.

Bio Matrix system- to protect data from unauthorized access

Pass word- to protect from unauthorized access

Theft of data. passwords locks encryption

Hackers someone who can gain unauthorized access to other computers. This can be as simple as figuring out somebody else's password or as complex as writing a custom program to break another computer's security software.

DATA SAFETY Hacking Hackers can change files or can make transactions.

We can protect our data from hackers by using fairwall.

Viruses a program or part of code that is loaded onto your PC without your knowledge & runs against your wishes.

virus Computer viruses are programs written by "mean" people. Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive.

Trojan Horses A trojan horse is not a virus. It is a program that you run because you think it will serve a useful purpose such as a game or provides entertainment. Like a "trojan horse" A trojan horse does not replicate or spread like a virus.

Trojan Horses a destructive program that masquerades as a benign application. Unlike viruses, Trojan horses don’t replicate themselves.

Worms –a program or algorithm that replicates itself over a computer network & usually performs malicious actions,

Antivirus

Hardware protection UPS (uninterrupted power supply )-to avoid the risk of sudden power failure and fluctuations Stabilizer – to control the voltage Surge protection- to protect agents lightning and thundering

Surge protection to protect against lightening & thunder. Stabilizer –To control the voltage.

COMPUTER & SECURITY We can mainly divided computer & security for the 3 parts. computer safety. data safety. our safety.

Hardware protecting UPS –(uninterrupted power supplier) To avoid risk of sudden power failure& fluctuations,

Computer security Physical security Environment should be.... 1) dust free 2) Dry 3) smoke free

COMPUTER SECURITY Physical security dust free dry smoke free