computer security measures

Upload: anniekhor2

Post on 05-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 Computer Security Measures

    1/17

  • 7/31/2019 Computer Security Measures

    2/17

    SMJK CHIO MIN

    CLASS 4A & 4TM3

    OBJECTIVES CONTENTS

    SUMMARY EVALUATION

  • 7/31/2019 Computer Security Measures

    3/17

    OBJECTIVES

    At the end of the lesson, students should be able to

    Select the appropriate security measures to overcomethe identified computer threats: antivirus, anti-spyware, firewall, data backup, and humanaspects.

    Describe the impact of ICT on society.

  • 7/31/2019 Computer Security Measures

    4/17

    3.3 security measures

    SecurityMeasures

    Anti-virus

    Cryptography

    HumanAspect

    Anti-spyware

    DataBackup

    Firewall

  • 7/31/2019 Computer Security Measures

    5/17

    Anti-virus

    Anti-virus is an utility program that we use to protecta computer against viruses by identifying andremoving computer viruses found in the computer

    memory, computer storage or incoming e-mails files.

    Examples of antivirus are Norton

    AVG Kaspersky

    Avira

    Bitdefender

  • 7/31/2019 Computer Security Measures

    6/17

    Anti-spyware

    Anti-spyware is an utility program that we use toprotect the computers from spyware

    Spyware is designed secretlyrecord and report anindividuals activities on the internet.

    It enters your systems through internet when you opene-mail or download software.

    Examples of antispyware program are Spybot Searchand Destroy, Ad-ware and Spyware Blaster.

  • 7/31/2019 Computer Security Measures

    7/17

    Firewall

    Firewall is a piece of hardware or software whichfunctions in a networked environment to prevent somecommunications forbidden by security policy.

    We use firewall to prevent hacking (unauthorizedaccess is the use of a computer or network withoutpermission).

  • 7/31/2019 Computer Security Measures

    8/17

    Data Backup

    Backup is utility program that makes a copy of all filesor selected files that have been saved onto a disk.

    Backup Data is to ensure our data can still be used ifthe original is corrupted and prevent our files frommalicious program.

  • 7/31/2019 Computer Security Measures

    9/17

    Cryptography

    Cryptographyis a process of transforming plaintextinto ciphertext then back again.

    Encryption is a process of converting plaintext intociphertext.

    Decryption is the process of converting ciphertextinto plaintext.

    We use cryptographyto secure the information andprevent hacking or unauthorized access.

  • 7/31/2019 Computer Security Measures

    10/17

    Cryptography

    I love ICTso much

    Plaintext

    MRNMEREOGOSANOW

    Ciphertext I love ICT

    so much

    Plaintext

    DECRYPTION

    ENCRYPTION

  • 7/31/2019 Computer Security Measures

    11/17

    Human Aspects

    Human Aspects refer to the user and also the intruderof a computer system.

    Human aspect security is the hardest aspects to giveprotection to. Lack of achieving a good informationsecurity procedure.

    Three ways of security through human aspects are Organization self awareness

    Organization user self awareness

    Individual user self awareness

  • 7/31/2019 Computer Security Measures

    12/17

    3.4. current and future

    development

    Impact of ICT in society

    Computer helps people to do their work fasterand more efficient by using the softwareapplication that consist of special program for

    specific tasks.

  • 7/31/2019 Computer Security Measures

    13/17

  • 7/31/2019 Computer Security Measures

    14/17

    activity

    Move in a group of three

    Get A4 paperfrom teacher

    Discuss in your group about

    your invention Draw the draft

  • 7/31/2019 Computer Security Measures

    15/17

    The Racing Game of Knowledge

    Continue

  • 7/31/2019 Computer Security Measures

    16/17

  • 7/31/2019 Computer Security Measures

    17/17

    summary There are several appropriate security measures to

    overcome the identified computer threats: antivirus,anti-spyware, firewall, data backup, cryptography

    and human aspects.

    Impact of ICT on society including:

    Home and education

    Business

    Graphics & multimedia

    Communication