Computer Security

  • Uploaded by: yusairri
  • 0
  • 0
  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Computer Security as PDF for free.

More details

  • Words: 342
  • Pages: 18
WHAT IS THIS????

1

1

2

2

Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification

3

3

-We need to protect our computer from any intruders such as hackers, crackers and script kiddies - We do not want strangers to read our e-mail, use our computer to attack other systems, send forged e-mail from our computer, or examine personal information stored on our computer such as financial statements.

4

4

Hardware security

Three types of computer security are :

software security / data security

Network security

5

5

Hardware security refers to security measures used to protect the hardware specifically the computer and its related documents.

6

6

Keyboard-locks

PC-locks The examples of security measures used to protect the hardware includes: Smart cards

Biometric devices

7

7

Software and data security refers to the security measures used to protect the software and the loss of data files

8

8

- Examples of security measures used to protect the software are activation code and serial number - An example of security measure used to protect the loss of data files is the disaster recovery plan method. -The idea of this plan is to store data, program and other important documents in a safe place that will not be affected y any major destruction. 9

9

-The transfer of data through network has become a common practice and the need to implement network security has become significant. - Network security refers to security measures used to protect the network system. -One example of network security measures is firewall. With firewall, network resources can be protected from the outsiders 10

10

In order to make sure our computer are secured, here are the computer security checklist to follow

11

11

12

12

13

13

14

14

15

15

16

16

17

17

-Computer security is a process of preventing and detecting unauthorised use of the computer -There are three types of computer security, which are hardware security, software/data security and network security 18

18

Related Documents


More Documents from "lpham74"

Input Devices-ict
June 2020 11
Data Manipulation-ict
June 2020 12
Network Topology-ict
June 2020 16
Induksi-comp Sys
June 2020 10
(ict)-introduction
June 2020 11