SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Shashi chandra
by
• The protection of
computer based resources
against unauthorized use or
natural disaster is known
as Security.
It defines the rights of the
individual users or organizations to keep their
personal data and information
Most of the damages
of data is caused by errors and
omissions. An organization always
needs accurate data for
transaction processing, providing
better service and making
A dishonest
programmer can easily any
software or data, if proper control
measures are not provided to the
system.
When the computer
resources can be misused
for unauthorized or illegal
function.
Fire and natural disaster like
floods , storms, snow-storms ,
lightning etc…
:-
The unauthorized modification of
data by dishonest employees of the
organization.
The special routines of a program .it
check whether the program is
performing correctly or not. It
do not have regular control
mechanisms and passwords. It is
use only when the normal
functioning of the software is
disturbed or stopped .
The special routines that
causes excessive damage
to the data or vital
program.
To get into someone
else’s computer system
without permission in
order to find out
information or do
Unauthorized copying of
confidential data from
hard disk to floppy
disks , which cannot be
detected by security
persons.
Monitoring of data
transmissions which are
meant for other persons.
refers to setting up a special
transmission path for
diverting the flow of data.
Unauthorized copying
of
data and programs
from all over the world
Illegal copying of
software's for the
purpose of distribution
It includes safeguards
against damage of
hardware's, software's and
data due to the physical
environment of the pc.
-
i.Using Password
ii.Fingerprints
iii.Keys
iv.Restricted
System
The access to various
computer resources by
authorized users must be
properly controlled.Examination of the
system (Application software) where
the program are working or not.
Encryption refers
to encode data
by converting the
standard data
code into
proprietary code.

• Security is critical for
maintaining the integrity of data
stored on the network servers.
 Login and Password Security
 Account Security
 Access Right
 Information about group to which the
user belongs.
The contingency measures
that an organization must
take to recover the data in
case it is damaged.
It is the most
efficient method of disaster
recovery. It is a duplicate copies
of important data and software.
Standards of moral
conduct to be followed by
employees for using various
Computer security

Weitere ähnliche Inhalte

Was ist angesagt?

3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
hazirma
 

Was ist angesagt? (20)

End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
System security
System securitySystem security
System security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 

Ähnlich wie Computer security

2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
mrmwood
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
misecho
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
bodo-con
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
anandanand521251
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
MISY
 

Ähnlich wie Computer security (20)

2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 
Mis 1
Mis 1Mis 1
Mis 1
 
Data security
Data securityData security
Data security
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Unit v
Unit vUnit v
Unit v
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Security and management
Security and managementSecurity and management
Security and management
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Computer security

  • 2.
  • 3. • The protection of computer based resources against unauthorized use or natural disaster is known as Security.
  • 4. It defines the rights of the individual users or organizations to keep their personal data and information Most of the damages of data is caused by errors and omissions. An organization always needs accurate data for transaction processing, providing better service and making
  • 5. A dishonest programmer can easily any software or data, if proper control measures are not provided to the system. When the computer resources can be misused for unauthorized or illegal function. Fire and natural disaster like floods , storms, snow-storms , lightning etc…
  • 6. :- The unauthorized modification of data by dishonest employees of the organization.
  • 7. The special routines of a program .it check whether the program is performing correctly or not. It do not have regular control mechanisms and passwords. It is use only when the normal functioning of the software is disturbed or stopped .
  • 8. The special routines that causes excessive damage to the data or vital program. To get into someone else’s computer system without permission in order to find out information or do
  • 9. Unauthorized copying of confidential data from hard disk to floppy disks , which cannot be detected by security persons.
  • 10. Monitoring of data transmissions which are meant for other persons. refers to setting up a special transmission path for diverting the flow of data.
  • 11. Unauthorized copying of data and programs from all over the world Illegal copying of software's for the purpose of distribution
  • 12. It includes safeguards against damage of hardware's, software's and data due to the physical environment of the pc.
  • 14. The access to various computer resources by authorized users must be properly controlled.Examination of the system (Application software) where the program are working or not.
  • 15. Encryption refers to encode data by converting the standard data code into proprietary code.
  • 16.  • Security is critical for maintaining the integrity of data stored on the network servers.  Login and Password Security  Account Security  Access Right  Information about group to which the user belongs.
  • 17. The contingency measures that an organization must take to recover the data in case it is damaged. It is the most efficient method of disaster recovery. It is a duplicate copies of important data and software. Standards of moral conduct to be followed by employees for using various