Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

Computer security

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Nächste SlideShare
Computer security overview
Computer security overview
Wird geladen in …3
×

Hier ansehen

1 von 18 Anzeige

Weitere Verwandte Inhalte

Diashows für Sie (20)

Anzeige

Aktuellste (20)

Computer security

  1. 1. Shashi chandra by
  2. 2. • The protection of computer based resources against unauthorized use or natural disaster is known as Security.
  3. 3. It defines the rights of the individual users or organizations to keep their personal data and information Most of the damages of data is caused by errors and omissions. An organization always needs accurate data for transaction processing, providing better service and making
  4. 4. A dishonest programmer can easily any software or data, if proper control measures are not provided to the system. When the computer resources can be misused for unauthorized or illegal function. Fire and natural disaster like floods , storms, snow-storms , lightning etc…
  5. 5. :- The unauthorized modification of data by dishonest employees of the organization.
  6. 6. The special routines of a program .it check whether the program is performing correctly or not. It do not have regular control mechanisms and passwords. It is use only when the normal functioning of the software is disturbed or stopped .
  7. 7. The special routines that causes excessive damage to the data or vital program. To get into someone else’s computer system without permission in order to find out information or do
  8. 8. Unauthorized copying of confidential data from hard disk to floppy disks , which cannot be detected by security persons.
  9. 9. Monitoring of data transmissions which are meant for other persons. refers to setting up a special transmission path for diverting the flow of data.
  10. 10. Unauthorized copying of data and programs from all over the world Illegal copying of software's for the purpose of distribution
  11. 11. It includes safeguards against damage of hardware's, software's and data due to the physical environment of the pc.
  12. 12. - i.Using Password ii.Fingerprints iii.Keys iv.Restricted System
  13. 13. The access to various computer resources by authorized users must be properly controlled.Examination of the system (Application software) where the program are working or not.
  14. 14. Encryption refers to encode data by converting the standard data code into proprietary code.
  15. 15.  • Security is critical for maintaining the integrity of data stored on the network servers.  Login and Password Security  Account Security  Access Right  Information about group to which the user belongs.
  16. 16. The contingency measures that an organization must take to recover the data in case it is damaged. It is the most efficient method of disaster recovery. It is a duplicate copies of important data and software. Standards of moral conduct to be followed by employees for using various

×