Welcome Topic : Security.

Slides:



Advertisements
Similar presentations
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Advertisements

1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
BUSINESS PLUG-IN B6 Information Security.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Chapter 10 Privacy and Security McGraw-Hill
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Security Awareness: Applying Practical Security in Your World
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Controls for Information Security
Discovering Computers 2010
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
BUSINESS B1 Information Security.
CS CS 5150 Software Engineering Lecture 18 Security.
Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification. Security.
Computer encryption is… Based on the science of cryptography.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
1.The Nature, Impact and Issues of Information Technology 1.6Strategies used to Prevent Deliberate and Accidental Illegal Actions.
1 Information Systems CS-507 Lecture Types of Controls Access Controls – Controlling who can access the system. Input Controls – Controls over how.
Data Security.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
Hot Topics in Information Security Rick Shaw – President, CorpNet Security, Inc. Mick Johannes – CTO, CorpNet Security, Inc.
Physical security By Ola Abd el-latif Abbass Hassan.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
CPT 123 Internet Skills Class Notes Internet Security Session B.
E-Commerce and Security Dr. John P. Abraham Professor University of Texas Pan American.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Social and Ethical Issues Overview of strand 1. Topics of strand 1 1. Reliability and integrity 2. Security 3. Privacy and anonymity 4. Intellectual property.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Security of, privacy of and access to personal/confidential information/data.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
Face Recognition Technology By Catherine jenni christy.M.sc.
Information Systems Design and Development Security Precautions Computing Science.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Information Security and Privacy By: Mike Battestilli.
Security Protecting information data confidentiality
Security Issues in Information Technology
Securing Information Systems
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Network security threats
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 10: Privacy, Security, and Ethics
User access levels, Passwords, Encryption, Cipher, Key
Unit 1.6 Systems security Lesson 4
برنامج أمن أنظمة الحاسب
Operating Systems Security
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Operating Systems Concepts
Protection Mechanisms in Security Management
Presentation transcript:

Welcome Topic : Security

Definition Security refers to the protection of hardware, software, machines and networks from unauthorized access. Security measures include restricted access to machines and networks for certain employees or to prevent access by hackers. The degree of security of information systems largely determines society’s confidence in the information contained in the systems.

Ways to secure access of data

Authentication Authentication is a process in which a user establishes his/her identity beyond reasonable doubt with a use of passwords, biometric data etc. Examples of biometric system may include fingerprint, retina scan, nose print, facial recognition. These data can be combined in a biometric template to provide better security.

Cryptography The science of ciphers and encryption is called cryptography. Encryption is translation of data into a secret code which can be decrypted back through a use of password. These methods are very useful when transmitting data from one system to another.

Why secure data ? To prevent unwanted tampering and loss of data. To avoid plagiarism. To protect copyright material. To prevent hacking. To avoid damage of software.

Why employ physical security ? Your data may be secured by sophisticated firewalls and various authentication techniques but a lack of physical security can cause

Bibliography All information displayed is purely based on my personal knowledge.

Thank You