data security. unauthorized access natural disaster accidentals destruction ( hard ware failure )
TRANSCRIPT
![Page 1: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/1.jpg)
Data Security
![Page 2: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/2.jpg)
Unauthorized AccessNatural disasterAccidentals Destruction ( Hard ware failure )
![Page 3: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/3.jpg)
Natural disaster
![Page 4: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/4.jpg)
Accidentals Destruction ( Hardware failure )
![Page 5: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/5.jpg)
Back up
Mostly protect data from natural disasters
![Page 6: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/6.jpg)
Unauthorized Access
![Page 7: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/7.jpg)
• Passwords
![Page 8: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/8.jpg)
• Locks
Some computers may have locks on them.
• Biometrics Locks.
![Page 9: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/9.jpg)
Bio Matrix system- to protect data from unauthorized access
![Page 10: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/10.jpg)
Pass word- to protect from unauthorized access
![Page 11: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/11.jpg)
![Page 12: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/12.jpg)
![Page 13: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/13.jpg)
• Theft of data.
passwords
locks
encryption
![Page 14: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/14.jpg)
Hackers
• someone who can gain unauthorized access to other computers.
• This can be as simple as figuring out somebody else's password or as complex as writing a custom program to break another computer's security software.
![Page 15: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/15.jpg)
DATA SAFETY
• Hacking
• Hackers can change files or can make transactions.
![Page 16: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/16.jpg)
• We can protect our data from hackers by using fairwall.
![Page 17: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/17.jpg)
• Viruses
• a program or part of code that is loaded onto your PC without your knowledge & runs against your wishes.
![Page 18: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/18.jpg)
virus
• Computer viruses are programs written by "mean" people.
• Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive.
![Page 19: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/19.jpg)
Trojan Horses
• A trojan horse is not a virus. It is a program that you run because you think it will serve a useful purpose such as a game or provides entertainment. Like a "trojan horse"
• A trojan horse does not replicate or spread like a virus.
![Page 20: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/20.jpg)
• Trojan Horses
• a destructive program that masquerades as a benign application. Unlike viruses, Trojan horses don’t replicate themselves.
![Page 21: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/21.jpg)
• Worms –a program or algorithm that replicates itself over a computer network & usually performs malicious actions,
![Page 22: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/22.jpg)
Antivirus
![Page 23: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/23.jpg)
Hardware protection
• UPS (uninterrupted power supply )-to avoid the risk of sudden power failure and fluctuations
• Stabilizer – to control the voltage• Surge protection- to protect
agents lightning and thundering
![Page 24: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/24.jpg)
• Surge protection to protect against lightening & thunder.
• Stabilizer –To control the voltage.
![Page 25: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/25.jpg)
COMPUTER & SECURITY
We can mainly divided computer & security for the 3 parts.
computer safety.
data safety.
our safety.
![Page 26: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/26.jpg)
• Hardware protecting
UPS –(uninterrupted power supplier)
To avoid risk of sudden power failure& fluctuations,
![Page 27: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/27.jpg)
Computer security
• Physical security
• Environment should be....
• 1) dust free
• 2) Dry
• 3) smoke free
![Page 28: Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )](https://reader035.vdocuments.us/reader035/viewer/2022062409/5697bfd11a28abf838caaed7/html5/thumbnails/28.jpg)
COMPUTER SECURITY
• Physical security
dust free
dry
smoke free