3.2.2 security measures

15
4.0 COMPUTER ETHICS AND SECURITY 4.2 Computer Security 4.2.2 Security Measures

Upload: hazirma

Post on 05-Dec-2014

1.613 views

Category:

Documents


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: 3.2.2 security measures

4.0 COMPUTER ETHICS AND SECURITY

4.2 Computer Security

4.2.2 Security Measures

Page 2: 3.2.2 security measures

2

LEARNING OUTCOMES:

At the end of this topic, students should be able to:

Identify different ways to overcome security risks.

Page 3: 3.2.2 security measures

Security Measures

Security Measures

Anti-virus Anti-spyware

Cryptography

Data backup

Firewall

Human aspect:

awareness

Page 4: 3.2.2 security measures

1.Anti-virus

A software use to protect computers against viruses by identifying and removing any computer virus found in memory, on storage media, or in incoming files.

Example:• McAfee VirusScan• Norton AntiVirus• AVG Anti-Virus• avast! Antivirus

Most anti-virus program also protect against other malware.

Page 5: 3.2.2 security measures

Programs that detect and deletes spywareExample :

Ad-Aware Spy Sweeper Windows Defender

2.Anti-spyware

Page 6: 3.2.2 security measures

• A firewall is hardware and/or software that protects a network’s resources from intrusion

3.Firewall

Hardware firewall is a built-in feature in routers that prevents unauthorized users from accessingfiles and computers in a network.

Page 7: 3.2.2 security measures

Firewall

Page 8: 3.2.2 security measures

Firewall

Page 9: 3.2.2 security measures

• A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed– To back up a file means to make a copy of it

• Offsite backups are stored in a location separate from the computer site Cloud

Storage

4. Data backup

Page 10: 3.2.2 security measures

• Two categories of backups:– Full backup – copies

all the files in the computer

– Selective backup – choose which folder and files to include in backup

• In the case of system failure, you can restore the file by copying the backed up files to their original location on the computer.

Data backup

Page 11: 3.2.2 security measures

5.CryptographyThe art of protecting information by transforming it (encrypting it) into an unreadable format

Technology of encoding information so it can only be read by authorized individuals

Encryption

Decryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

Process to decode encrypted data

Page 12: 3.2.2 security measures

Cryptography

Page 13: 3.2.2 security measures

How ?To read the data, you must decrypt it into readable

form.The unencrypted data is called plain text.The encrypted data is called cipher text.To encrypt, plain text converted into cipher text

using an encryption key.

Importance ?The process of proving one's identity. Ensuring that no one can read the message except the

intended receiver.

Cryptography

Page 14: 3.2.2 security measures

Expose employees or staff to computer security

Make a routine check to update from new virus, worm or other malicious threat.

Proper handling of computer and information

6.Human Aspects: Awareness

Page 15: 3.2.2 security measures

Computer Security

Computer Security Risk Security MeasureInternet and network attack Anti-virus

Anti-spywareFirewall

Human Aspect-Awareness

Unauthorized access and use FirewallHuman Aspect-Awareness

Hardware theft Data backupHuman Aspect-Awareness

Software theft Data backupHuman Aspect-Awareness

Information theft Data backupCryptography

Human Aspect-Awareness

System failure Data backupHuman Aspect-Awareness

a