Download presentation
Presentation is loading. Please wait.
1
Part 3
2
Information security We must protect data against Lose data Hackers
Are intended to protect a company intellectual property. Some files contain sensitive data like ( research for new product , management accounts ) so we should protect it We must protect data against Lose data Hackers viruses
3
Lose data
4
The Importance of shutting down your Computer
When you are using a windows , its important to remember that switching off the computer or losing power (power cut) can cause lose data , to protect against this you should save your work regularly When you shutdown your computer you data will save automatically
5
UPS ( Un – interruptible power supply )
Its device which you can attached to your computer which will guard against power cuts It contains a batteries which will keep your computer alive along enough for you to use the shutdown
6
Back up The most important thing that you store on your computer is information. Often the contents of a hard disk can represent years of work. If the hard disk stops working one day you could lose all those years of work. For this reason it is VITAL that you take regular backups of the information that is stored on the computer.
7
Organize your computer for more efficient backups
Complete vs. incremental backups Use 'off-site' storage Beware of 'open files‘
8
Hackers
9
Access right Determine which files individuals can read or change on the network You can access to the network by using User name and Password
10
User ID and Password A user ID is normally use to log in to a computer or computer network Use a password which is only known to you The password guarantees that no one can access network and impersonate you The idea of access rights is that you only have the ability to connect to or share devices which you have authority to use
11
Using a secure password
Is important to chose a password which can not be easily guessed by other people It should be at least 8 characters and contain mixture of number and word You should to change your password regularly
12
What if your laptop stolen
You must have a back up to your important file to restore it You must make a password to your laptop to prevent misuse the confidential data
13
Virus
14
Computer Virus What are computer viruses? How infect your computer
How do you protect computers from attacks Anti virus update
15
Poor Anti virus Practice Good Anti virus Practice
Updating anti virus once a year Scheduling virus check to run once a day Opening unknown from unknown source Deleting from unknown source Ensuring that no updates made to antivirus software Regular visiting the web site of your anti virus software suppliers Running software that you have received by Running a virus check on an attachment Only coping applications from close friend Scanning un familiar disks with anti-virus software Rebooting you PC if you find a file that is infected Write protection all copies of application disks once they have been checked Virus scanning all applications before loading them on to your hard disk
16
Data protection legislation
Safeguard the privacy of personal data You can result in litigation if personal data is not adequately protected Obliges organizations to protect confidential data with their control
17
Software Copy Right you must not copy programs which you purchase are copy righted Make sure that have a license which enable you to copy the software If you have not software license , you can not copy the software to other authorized in your network
18
Copy right Publishing digital work on disk require permission from the copy right holder Copy right provide control over how other people make disk copies of some one works You can make a backup of software bought for own use Scanned image are subject to copy right Audio files are subject to copy right Graphic are subject to copy right
19
Types of software license
Free ware This software which can be copied or downloaded for free Shareware This is where you can use software for a free trial period User license It s allow you to make copies and install software in each It also define how many copies of the software you determine to use
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.