Presentation is loading. Please wait.

Presentation is loading. Please wait.

Group 2 module 2 obj 15 explain the meaning of terms related to the security of Information Technology Systems.

Similar presentations


Presentation on theme: "Group 2 module 2 obj 15 explain the meaning of terms related to the security of Information Technology Systems."— Presentation transcript:

1 Group 2 module 2 obj 15 explain the meaning of terms related to the security of Information Technology Systems

2 What is data security in computers?
Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from corruption. ... Data security is also known as information security (IS) orcomputer security.

3 Some examples of data security
1) passwords 2) firewalls 3) encription 4) verification 5) authentication

4 What is a password? a string of characters that allows access to a computer, interface, or system. "each user has a password in order to log on to the network"

5 What is a firewall? Software firewalls. Software firewalls are designed to protect a computer by blocking certain programs from sending and receiving information from a local network or the Internet. The image to the right shows the icon for Windows Firewall, an example of a firewall software program included with Microsoft Windows .

6 What is encription? Even the sender can not decrypt the message that he or she created once it is encrypted with the public key belonging to another user. Examples of modern asymmetric encryption algorithms include Pretty Good Privacy (PGP) and the Rivest Shamir Adelman (RSA) algorithm.

7 What is the point of encryption?
Encryption is the most effective way to achieve data security. To read an encryptedfile, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.

8 What is verification? Verification and validation are independent procedures that are used together for checking that a product, service, or system meets requirements and specifications and that it fulfills its intended purpose.

9 What is validation? The Four Types of Process Validation. 7 years ago. Process validation is defined as the collection and evaluation of data, from the process design stage throughout production, which establishes scientific evidence that a process is capable of consistently delivering quality products.

10 Difference between verification and validation
Difference between Verification and Validation. The distinction between the two terms is largely to do with the role of specifications. Validation is the process of checking whether the specification captures the customer's needs. ... Verification is the process of checking that the software meets the specifica

11 Different types of validation checks
Range check Consistency check Format check

12 What is a range check? Validation is an automatic computer check to ensure that the data entered is sensible and reasonable. It does not check the accuracy of data. For example, a secondary school student is likely to be aged between 11 and 16. The computer can be programmed only to accept numbers between 11 and 16. This is a range check

13 What is a consistency check?
Synchronization with consistency check, also referred to as “a consistency check,” is the process by which DPM checks for and corrects inconsistencies between a protected volume and its replica

14 What is a format check? A format check is a routine check to see if the data entered is in a specific format that is required. An example of this is if sum one ask for date of birth dose the person enter date month year or year month date or month date year? This check ensures that the following data that is enter is entered correctly in the computer.


Download ppt "Group 2 module 2 obj 15 explain the meaning of terms related to the security of Information Technology Systems."

Similar presentations


Ads by Google