SlideShare ist ein Scribd-Unternehmen logo
1 von 8
 Definition of Security Measures
 Type of Security Measures :
a) Data Backup
b) Cryptography
c) Antivirus
d) Anti-spyware
e) Firewall
f) Human Aspects
 Conclusion
 Sources of References
• Security measures can be use to prevent this invader from getting the
account information.
• For example, the bank can use a firewall to prevent unauthorised access to
its database.
a) Data Backup :
- The Backup system is needed to backup all data and application in the computer.
With the backup system, data can be recovered in case emergency.
- Depending on the importance of the information, daily, weekly or biweekly backups
from hard disk can be performed.
b) Cryptography :
- The process of hiding information by altering the actual information into different
representation for sample an APA as 1? X.
- Almost all cryptography system depend on a key such as a password like the number
or a phrase that can be used to encrypt or decrypt a message.
- The traditional type of cryptosystem used on a computer network is called a
symmetric secret key system.
c) Antivirus :
- Antivirus is a program that protects a computer against viruses by identifying and
removing any computer viruses found.
- It will identify, prevent and eliminate computer viruses and other malicious software.
- Example of antivirus are VirusScan, Norton Antivirus, Trend Micro PC-cillin and
Doctor Solomon.
Virus Signature Inoculating a Program File
Also called a virus definition is a
specific patern of the virus code
The antivirus program records
information such as the file size
and file creation date in a separate
inoculating file.
The antivirus program then uses
this information to detect if a virus
tampers with the data describing
the inoclulating program file.
d) Anti-Spyware :
- Anti-spyware software is a program that detects, quarantines and removes spyware
to prevent them from getting into your computer.
- Examples of anti-spyware software are Lavasoft Ad-Awares SE Personal, PC Health
Plan and Malware Scanner.
- Among of the popular anti-spyware programs are Spybot Search and Destroy, Ad-
Aware and Spyware Blaster.
e) Firewall :
- A firewall is a hardware or software that protects a network’s resources from
intrusion by users on another network such as internet.
- A firewall restricts information that comes to your computer from another computer.
- It gives you more control over the data on your computer and provides a defense
against people or programs that try to connect to your computer without invitation.
- Type of firewall are Screening Routers , Proxy Gateway and Guard.
f) Human Aspects :
- Measures that can prevent from theft are by using locks, smart-card or password.
- Prevent portability by restricting the hardware from being moved.
- Detect and guard all exits and record any hardware transported.
- Example of human aspects are Organisation Self Awareness, Organisation User Self
Awareness and Individual User Self Awareness.
Organisation Self
Awareness
Organisation User Self
Awareness
Individual User Self
Awareness
Organisation need to be
aware of the people they
work with. Some threat could
also come from within the
organisation and not just
from the outside.
Provide employee with
adequate training and the
importance of security and
control. Even a very high-tech
protection system could not
protect the system against
incompetent users.
Threat often comes in
beautiful offers and packages.
Do not download or install
software from unreliable
sources. Do not exposes
important information to
strangers.
◊ Security measures is important to protect our computer and data from any security threats.
◊ Security measures must be update to avoid any latest security threats.
◊ ICT Form 4 Note Book
◊ http://www.slideshare.net/hanna91/security-measures
Security Measures

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Email security
Email securityEmail security
Email security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 

Andere mochten auch

Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)ainizbahari97
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measuresjoy grace bagui
 
Network Security
Network SecurityNetwork Security
Network SecurityJoe Baker
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measuressyamil91
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measuresManish Singh
 
Router hardening project.slide
Router hardening project.slideRouter hardening project.slide
Router hardening project.slideAlya Al Saadi
 
Skyscraper Security Mgt Part II- by Richard Garrity
Skyscraper Security Mgt  Part II- by Richard GarritySkyscraper Security Mgt  Part II- by Richard Garrity
Skyscraper Security Mgt Part II- by Richard GarrityRichard Garrity
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Applicationedavid2685
 
ConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personalConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personalEricsson
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patternsNoel Tan
 
Pak china relations
Pak china relationsPak china relations
Pak china relationsRoshan3246
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating systemAbou Bakr Ashraf
 
China Pakistan Economic Corridor (CPEC)
China Pakistan Economic Corridor (CPEC)China Pakistan Economic Corridor (CPEC)
China Pakistan Economic Corridor (CPEC)shahroze11
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)Navneet Jingar
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security PresentationWajahat Rajab
 

Andere mochten auch (20)

Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)
 
Router hardening project.slide
Router hardening project.slideRouter hardening project.slide
Router hardening project.slide
 
Skyscraper Security Mgt Part II- by Richard Garrity
Skyscraper Security Mgt  Part II- by Richard GarritySkyscraper Security Mgt  Part II- by Richard Garrity
Skyscraper Security Mgt Part II- by Richard Garrity
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
ConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personalConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personal
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
 
Pak china relations
Pak china relationsPak china relations
Pak china relations
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
China Pakistan Economic Corridor (CPEC)
China Pakistan Economic Corridor (CPEC)China Pakistan Economic Corridor (CPEC)
China Pakistan Economic Corridor (CPEC)
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 

Ähnlich wie Security Measures

Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
 
Cyber Incident Response Proposed Strategies
Cyber Incident Response Proposed StrategiesCyber Incident Response Proposed Strategies
Cyber Incident Response Proposed StrategiesDam Frank
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2smktsj2
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxmahaliacaraan
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
A sneak peek into the top 5 network security solutions.docx
A sneak peek into the top 5 network security solutions.docxA sneak peek into the top 5 network security solutions.docx
A sneak peek into the top 5 network security solutions.docxNeilStark1
 
A sneak peek into the top 5 network security solutions.pdf
A sneak peek into the top 5 network security solutions.pdfA sneak peek into the top 5 network security solutions.pdf
A sneak peek into the top 5 network security solutions.pdfNeilStark1
 

Ähnlich wie Security Measures (20)

Notacd02
Notacd02Notacd02
Notacd02
 
Notacd02
Notacd02Notacd02
Notacd02
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Cyber Incident Response Proposed Strategies
Cyber Incident Response Proposed StrategiesCyber Incident Response Proposed Strategies
Cyber Incident Response Proposed Strategies
 
Data security
Data securityData security
Data security
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
A sneak peek into the top 5 network security solutions.docx
A sneak peek into the top 5 network security solutions.docxA sneak peek into the top 5 network security solutions.docx
A sneak peek into the top 5 network security solutions.docx
 
A sneak peek into the top 5 network security solutions.pdf
A sneak peek into the top 5 network security solutions.pdfA sneak peek into the top 5 network security solutions.pdf
A sneak peek into the top 5 network security solutions.pdf
 

Kürzlich hochgeladen

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Kürzlich hochgeladen (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Security Measures

  • 1.  Definition of Security Measures  Type of Security Measures : a) Data Backup b) Cryptography c) Antivirus d) Anti-spyware e) Firewall f) Human Aspects  Conclusion  Sources of References
  • 2. • Security measures can be use to prevent this invader from getting the account information. • For example, the bank can use a firewall to prevent unauthorised access to its database.
  • 3. a) Data Backup : - The Backup system is needed to backup all data and application in the computer. With the backup system, data can be recovered in case emergency. - Depending on the importance of the information, daily, weekly or biweekly backups from hard disk can be performed. b) Cryptography : - The process of hiding information by altering the actual information into different representation for sample an APA as 1? X. - Almost all cryptography system depend on a key such as a password like the number or a phrase that can be used to encrypt or decrypt a message. - The traditional type of cryptosystem used on a computer network is called a symmetric secret key system.
  • 4. c) Antivirus : - Antivirus is a program that protects a computer against viruses by identifying and removing any computer viruses found. - It will identify, prevent and eliminate computer viruses and other malicious software. - Example of antivirus are VirusScan, Norton Antivirus, Trend Micro PC-cillin and Doctor Solomon. Virus Signature Inoculating a Program File Also called a virus definition is a specific patern of the virus code The antivirus program records information such as the file size and file creation date in a separate inoculating file. The antivirus program then uses this information to detect if a virus tampers with the data describing the inoclulating program file.
  • 5. d) Anti-Spyware : - Anti-spyware software is a program that detects, quarantines and removes spyware to prevent them from getting into your computer. - Examples of anti-spyware software are Lavasoft Ad-Awares SE Personal, PC Health Plan and Malware Scanner. - Among of the popular anti-spyware programs are Spybot Search and Destroy, Ad- Aware and Spyware Blaster. e) Firewall : - A firewall is a hardware or software that protects a network’s resources from intrusion by users on another network such as internet. - A firewall restricts information that comes to your computer from another computer. - It gives you more control over the data on your computer and provides a defense against people or programs that try to connect to your computer without invitation. - Type of firewall are Screening Routers , Proxy Gateway and Guard.
  • 6. f) Human Aspects : - Measures that can prevent from theft are by using locks, smart-card or password. - Prevent portability by restricting the hardware from being moved. - Detect and guard all exits and record any hardware transported. - Example of human aspects are Organisation Self Awareness, Organisation User Self Awareness and Individual User Self Awareness. Organisation Self Awareness Organisation User Self Awareness Individual User Self Awareness Organisation need to be aware of the people they work with. Some threat could also come from within the organisation and not just from the outside. Provide employee with adequate training and the importance of security and control. Even a very high-tech protection system could not protect the system against incompetent users. Threat often comes in beautiful offers and packages. Do not download or install software from unreliable sources. Do not exposes important information to strangers.
  • 7. ◊ Security measures is important to protect our computer and data from any security threats. ◊ Security measures must be update to avoid any latest security threats. ◊ ICT Form 4 Note Book ◊ http://www.slideshare.net/hanna91/security-measures