SECURITY MEASURE S Name:SUHAILA OSMAN Class:5Cemerlang
INTRODUCTION
Today, people rely on computer to create , store and manage critical information.It is important that the computer and the data they stored are accesible and avaiable when needed.It is also important that user take measures to protect their computers and data from lose,damage and missue.How do we protect our computer from breaches of security and our security risk?
There are 6 types of security measures:
-Data backup
-Cryptography
-Anti-Virus
-Anti-Spyware
-Firewall and human aspects
AUTHENTICATION METHOD
There are 2 commonly used Authentication Methods :
-Biometric Device -Callback device
CONTENT -Introduction -Authentication -Authentication Method -Biometric Device -Callback System -Conclusion -Refrences
AUTHENTICATION Authentication is a process where users verify that they are who they say they are.The user who attempts to perform functions in a system is in fact the user who is authorized to do so Authentication is important in order to safeguard against the unauthorized access and use
BIOMETRIC DEVICE -A device that translate personal characteristics into a digital code that is compared with a digital code stored in the dataase. -Example of bioemetric devices are : -Fingerprint recognition -Facial recognition -Iris scaning -Retinal Scanning -Voice recognition -Signature verification system -Hand Geometry
CALLBACK SYSTEM
-Refers to the checking system that authenticates the user -This is commonly used in the bank operation and business transaction -For example , when you book a taxi service , the operation will ask you to hang up and she will call you back to confirm for the service required.
CONCLUSION -It is important that the computer and the data they stored are accessible and avaiable when needed. -It is also important that user take measures to protect their computer and data from last , damage misuse.
REFRENCES
I Collect information to helpful to me in my ICT PROJECT which are :
CD ICT ICT NOTE FROM BOOK FORM 4
THE END