LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can.

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Protection of personal mobile computer devices Information Security Isaac Fernandes, mci12009 Sofia Nunes, mci12014.
MIS PROTECTING INFORMATION RESOURCES Biometrics Identity theft
Lecture 12 Information Security and Confidentiality (Chapter 12)
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Factors to be taken into account when designing ICT Security Policies
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
PROTECTING INFORMATION RESOURCES CHAPTER 5 Hossein BIDGOLI MIS Biometrics Identity theft Mary Stewart.
Administrative Practices Outcome 1
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Video Following is a video of what can happen if you don’t update your security settings! security.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
BUSINESS B1 Information Security.
Section 6 Theory Software Copyright, Viruses and Hacking.
UNIT 15 WEEK 3 CLASS 1 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
All of you will be able to:
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
UNIT 19 Data Security 2.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
UNIT 15 WEEK 3 CLASS 2 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
Welcome Topic : Security.
Borders Business Programme IT and Marketing Functions of Web-based Systems Russell Taylor Lecturer in Computing Borders Business Programme.
Networking Network Classification, by there: 3 Security And Communications software.
Security and Ethics Safeguards and Codes of Conduct.
Physical security By Ola Abd el-latif Abbass Hassan.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally.
1 6 Further System Fundamentals (HL) 6.4 Further Network Fundamentals.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Unit 32 – Networked Systems Security
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Information Systems Design and Development Security Precautions Computing Science.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Technical Implementation: Security Risks
Securing Information Systems
Risk management.
Administrative Practices Outcome 1
Network security threats
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
NETWORK SECURITY.
Identity & Access Management
Data integrity and security
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Network Security Mark Creighton GBA 576 6/4/2019.
Protection Mechanisms in Security Management
G061 - Network Security.
Presentation transcript:

LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can help keep systems secure (P2) Describe how software and network security can keep systems and data secure (P3) Physical Security Logical Security Keyword: Physical Security Logical Security

Physical Security – Actions which can be taken to protect buildings, property and assets against intruders. Logical Security – Methods using software which are designed to safeguard systems. LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can help keep systems secure (P2) Describe how software and network security can keep systems and data secure (P3) Keyword: Physical Security – Actions which can be taken to protect buildings, property and assets against intruders. Logical Security – Methods using software which are designed to safeguard systems.

Using a table describe and give advantages and disadvantages of each of the following physical security methods:  Lock and key  Visitor passes  Sign in/out systems  Retinal Scan  Fingerprint Recognition  Iris Scan  Voice Recognition  Other biometric recognition (give examples)  Cable shielding LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can help keep systems secure (P2) Describe how software and network security can keep systems and data secure (P3) Keyword: Physical Security – Actions which can be taken to protect buildings, property and assets against intruders. Logical Security – Methods using software which are designed to safeguard systems.

Progress check: Feedback on terms with descriptions, advantages and disadvantages. LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can help keep systems secure (P2) Describe how software and network security can keep systems and data secure (P3) Keyword: Physical Security – Actions which can be taken to protect buildings, property and assets against intruders. Logical Security – Methods using software which are designed to safeguard systems.

Describe each of the following logical security methods:  Encryption  Handshaking  Diskless networks  Firewall  Anti Virus software  Intrusion detection system  Passwords – how to make a strong password?  Access levels of data (read, write and execute) LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can help keep systems secure (P2) Describe how software and network security can keep systems and data secure (P3) Keyword: Physical Security – Actions which can be taken to protect buildings, property and assets against intruders. Logical Security – Methods using software which are designed to safeguard systems.

Plenary Can any one of the physical or logical security methods be called ‘the best’?? Discuss LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can help keep systems secure (P2) Describe how software and network security can keep systems and data secure (P3) Keyword: Physical Security – Actions which can be taken to protect buildings, property and assets against intruders. Logical Security – Methods using software which are designed to safeguard systems.