Presentation is loading. Please wait.

Presentation is loading. Please wait.

Part 3.

Similar presentations


Presentation on theme: "Part 3."— Presentation transcript:

1 Part 3

2 Information security We must protect data against Lose data Hackers
Are intended to protect a company intellectual property. Some files contain sensitive data like ( research for new product , management accounts ) so we should protect it We must protect data against Lose data Hackers viruses

3 Lose data

4 The Importance of shutting down your Computer
When you are using a windows , its important to remember that switching off the computer or losing power (power cut) can cause lose data , to protect against this you should save your work regularly When you shutdown your computer you data will save automatically

5 UPS ( Un – interruptible power supply )
Its device which you can attached to your computer which will guard against power cuts It contains a batteries which will keep your computer alive along enough for you to use the shutdown

6 Back up The most important thing that you store on your computer is information. Often the contents of a hard disk can represent years of work. If the hard disk stops working one day you could lose all those years of work. For this reason it is VITAL that you take regular backups of the information that is stored on the computer.

7 Organize your computer for more efficient backups
Complete vs. incremental backups Use 'off-site' storage Beware of 'open files‘

8 Hackers

9 Access right Determine which files individuals can read or change on the network You can access to the network by using User name and Password

10 User ID and Password A user ID is normally use to log in to a computer or computer network Use a password which is only known to you The password guarantees that no one can access network and impersonate you The idea of access rights is that you only have the ability to connect to or share devices which you have authority to use

11 Using a secure password
Is important to chose a password which can not be easily guessed by other people It should be at least 8 characters and contain mixture of number and word You should to change your password regularly

12 What if your laptop stolen
You must have a back up to your important file to restore it You must make a password to your laptop to prevent misuse the confidential data

13 Virus

14 Computer Virus What are computer viruses? How infect your computer
How do you protect computers from attacks Anti virus update

15 Poor Anti virus Practice Good Anti virus Practice
Updating anti virus once a year Scheduling virus check to run once a day Opening unknown from unknown source Deleting from unknown source Ensuring that no updates made to antivirus software Regular visiting the web site of your anti virus software suppliers Running software that you have received by Running a virus check on an attachment Only coping applications from close friend Scanning un familiar disks with anti-virus software Rebooting you PC if you find a file that is infected Write protection all copies of application disks once they have been checked Virus scanning all applications before loading them on to your hard disk

16 Data protection legislation
Safeguard the privacy of personal data You can result in litigation if personal data is not adequately protected Obliges organizations to protect confidential data with their control

17 Software Copy Right you must not copy programs which you purchase are copy righted Make sure that have a license which enable you to copy the software If you have not software license , you can not copy the software to other authorized in your network

18 Copy right Publishing digital work on disk require permission from the copy right holder Copy right provide control over how other people make disk copies of some one works You can make a backup of software bought for own use Scanned image are subject to copy right Audio files are subject to copy right Graphic are subject to copy right

19 Types of software license
Free ware This software which can be copied or downloaded for free Shareware This is where you can use software for a free trial period User license It s allow you to make copies and install software in each It also define how many copies of the software you determine to use


Download ppt "Part 3."

Similar presentations


Ads by Google