Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.

Similar presentations


Presentation on theme: "Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software."— Presentation transcript:

1 Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software Security | Data Security |When Disaster Strikes Disaster Recovery Plan Software SecurityData Security Personal Computer SecurityPersonal Computer Security | Prepare for the WorstPrepare for the Worst Home

2 Identification and Access: Who Goes There? What you have- Systems have been created in which someone needs a key, magnetized card, or some other tool to gain access to the computer’s room. What you have- Systems have been created in which someone needs a key, magnetized card, or some other tool to gain access to the computer’s room. What you know- Some systems require the user to have a password or an I.D. number that opens a lock on a door, monitor screen, etc. What you know- Some systems require the user to have a password or an I.D. number that opens a lock on a door, monitor screen, etc. What you do- Signatures are always a good form of identification but they have been improved with scanned and online signatures. What you do- Signatures are always a good form of identification but they have been improved with scanned and online signatures. What you are- There are new forms of measuring specific characteristics of the body through electronic means. This is called biometrics and can be used in fingerprinting, voice recognition, and retinal scans. What you are- There are new forms of measuring specific characteristics of the body through electronic means. This is called biometrics and can be used in fingerprinting, voice recognition, and retinal scans. Back

3 When Disaster Strikes: What Do You have to Lose? There are different kinds of disasters which include natural and human sources. There are different kinds of disasters which include natural and human sources. Natural disasters can destroy hardware and create a memory loss within the software. Natural disasters can destroy hardware and create a memory loss within the software. There are also human sources for a computer disaster which usually involve some sort of software virus. There are also human sources for a computer disaster which usually involve some sort of software virus. Software loss can be prevented by backing up files with copies. Software loss can be prevented by backing up files with copies. Back

4 Disaster Recovery Plan A disaster recovery plan is basically a way to get files or software that was lost due to some sort of disaster. A disaster recovery plan is basically a way to get files or software that was lost due to some sort of disaster. Consortium- A consortium is a joint venture to support a complete computer facility. Consortium- A consortium is a joint venture to support a complete computer facility. Hot Site- A hot site is a fully equipped computer center with hardware, environmental controls, security, and communications facilities. Hot Site- A hot site is a fully equipped computer center with hardware, environmental controls, security, and communications facilities. Cold Site- A cold site is an environmentally suitable empty shell in which a company can install its own computer system. Cold Site- A cold site is an environmentally suitable empty shell in which a company can install its own computer system. Back

5 Software Security If the writer of the software is an employee of the company for whom the software was written, the software belongs to that company. If the writer of the software is an employee of the company for whom the software was written, the software belongs to that company. If the writer of the program is a consultant then there should be a specification in the contract as to who the software belongs to If the writer of the program is a consultant then there should be a specification in the contract as to who the software belongs to Back

6 Data Security Secured Waste- The use of shredders and locked trash barrels can prevent unauthorized people from viewing discarded printouts and printer ribbons. Secured Waste- The use of shredders and locked trash barrels can prevent unauthorized people from viewing discarded printouts and printer ribbons. Internal Controls- These are controls created to monitor when, who, and what was getting used on the computer system. Internal Controls- These are controls created to monitor when, who, and what was getting used on the computer system. Auditor Checks- In most companies there is an auditor who can check who has accessed data and when, and they are able to check the validity and accuracy of the computer systems operations and output. Auditor Checks- In most companies there is an auditor who can check who has accessed data and when, and they are able to check the validity and accuracy of the computer systems operations and output. Applicant Screening- Problems and security risks that arise in computer systems tend to be mostly operator problems. The screening of applicants can help to get rid of those employees who might be a risk. Applicant Screening- Problems and security risks that arise in computer systems tend to be mostly operator problems. The screening of applicants can help to get rid of those employees who might be a risk. Passwords- These are security measures which require certain words or numbers to be entered to access information on the computer. Passwords- These are security measures which require certain words or numbers to be entered to access information on the computer. Built-in Software Protection- Software can have built in user numbers that only allow that person and anyone else with the user number to access the information. Protection can also include tracking of who attempts to access the information but is denied. Built-in Software Protection- Software can have built in user numbers that only allow that person and anyone else with the user number to access the information. Protection can also include tracking of who attempts to access the information but is denied. Back

7 Personal Computer Security There is an active market for stolen personal computers, and it can be prevented easily using locks and cables on the unit and its external components. There is an active market for stolen personal computers, and it can be prevented easily using locks and cables on the unit and its external components. Surge Protector- A surge protector prevents electrical problems from destroying data files. Surge Protector- A surge protector prevents electrical problems from destroying data files. Uninterruptible Power Supply (UPS)- These include not just a surge protector but an extra power supply as well incase of a power outage. Uninterruptible Power Supply (UPS)- These include not just a surge protector but an extra power supply as well incase of a power outage. Back

8 Prepare for the Worst: Back Up Your Files What could go wrong?- There are different ways in which a computer system could have problems. Data could be entered wrong What could go wrong?- There are different ways in which a computer system could have problems. Data could be entered wrong Ways to back up files- The most common way to back up files is to copy information from the hard disk files to a diskette. Other safer and faster ways are tape drives, CD-RW, and DVD-RAMs. Ways to back up files- The most common way to back up files is to copy information from the hard disk files to a diskette. Other safer and faster ways are tape drives, CD-RW, and DVD-RAMs. Types of backup- Types of backup- –Full backup- complete copy of hard drive –Differential backup- copies every change since the last full backup –Incremental backup- copies everything since the last full or differential backup Back


Download ppt "Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software."

Similar presentations


Ads by Google