Security Measures

  • Uploaded by: yusairri
  • 0
  • 0
  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Security Measures as PDF for free.

More details

  • Words: 350
  • Pages: 10
SECURITY MEASURE S Name:SUHAILA OSMAN Class:5Cemerlang

INTRODUCTION 

Today, people rely on computer to create , store and manage critical information.It is important that the computer and the data they stored are accesible and avaiable when needed.It is also important that user take measures to protect their computers and data from lose,damage and missue.How do we protect our computer from breaches of security and our security risk?



There are 6 types of security measures:



-Data backup



-Cryptography



-Anti-Virus



-Anti-Spyware



-Firewall and human aspects

AUTHENTICATION METHOD 

There are 2 commonly used Authentication Methods :

-Biometric Device  -Callback device 

CONTENT -Introduction  -Authentication  -Authentication Method  -Biometric Device  -Callback System  -Conclusion  -Refrences 

AUTHENTICATION Authentication is a process where users verify that they are who they say they are.The user who attempts to perform functions in a system is in fact the user who is authorized to do so  Authentication is important in order to safeguard against the unauthorized access and use 

BIOMETRIC DEVICE -A device that translate personal characteristics into a digital code that is compared with a digital code stored in the dataase.  -Example of bioemetric devices are :  -Fingerprint recognition  -Facial recognition  -Iris scaning  -Retinal Scanning  -Voice recognition  -Signature verification system  -Hand Geometry 

CALLBACK SYSTEM 





-Refers to the checking system that authenticates the user -This is commonly used in the bank operation and business transaction -For example , when you book a taxi service , the operation will ask you to hang up and she will call you back to confirm for the service required.

CONCLUSION -It is important that the computer and the data they stored are accessible and avaiable when needed.  -It is also important that user take measures to protect their computer and data from last , damage misuse. 

REFRENCES 

I Collect information to helpful to me in my ICT PROJECT which are :

CD ICT  ICT NOTE FROM BOOK FORM 4 

 

THE END

Related Documents


More Documents from ""

Input Devices-ict
June 2020 11
Data Manipulation-ict
June 2020 12
Network Topology-ict
June 2020 16
Induksi-comp Sys
June 2020 10
(ict)-introduction
June 2020 11