Download presentation
Presentation is loading. Please wait.
Published byDominick Norman Modified over 9 years ago
1
Data Security
2
Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
3
Natural disaster
4
Accidentals Destruction ( Hardware failure )
5
Back up Mostly protect data from natural disasters
6
Unauthorized Access
7
Passwords
8
Locks Some computers may have locks on them. Biometrics Locks.
9
Bio Matrix system- to protect data from unauthorized access
10
Pass word- to protect from unauthorized access
13
Theft of data. passwords locks encryption
14
Hackers someone who can gain unauthorized access to other computers. This can be as simple as figuring out somebody else's password or as complex as writing a custom program to break another computer's security software.
15
DATA SAFETY Hacking Hackers can change files or can make transactions.
16
We can protect our data from hackers by using fairwall.
17
Viruses a program or part of code that is loaded onto your PC without your knowledge & runs against your wishes.
18
virus Computer viruses are programs written by "mean" people. Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive.
19
Trojan Horses A trojan horse is not a virus. It is a program that you run because you think it will serve a useful purpose such as a game or provides entertainment. Like a "trojan horse" A trojan horse does not replicate or spread like a virus.
20
Trojan Horses a destructive program that masquerades as a benign application. Unlike viruses, Trojan horses don’t replicate themselves.
21
Worms –a program or algorithm that replicates itself over a computer network & usually performs malicious actions,
22
Antivirus
23
Hardware protection UPS (uninterrupted power supply )-to avoid the risk of sudden power failure and fluctuations Stabilizer – to control the voltage Surge protection- to protect agents lightning and thundering
24
Surge protection to protect against lightening & thunder. Stabilizer –To control the voltage.
25
COMPUTER & SECURITY We can mainly divided computer & security for the 3 parts. computer safety. data safety. our safety.
26
Hardware protecting UPS –(uninterrupted power supplier) To avoid risk of sudden power failure& fluctuations,
27
Computer security Physical security Environment should be.... 1) dust free 2) Dry 3) smoke free
28
COMPUTER SECURITY Physical security dust free dry smoke free
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.