3.2.2 security measures
DESCRIPTION
TRANSCRIPT
4.0 COMPUTER ETHICS AND SECURITY
4.2 Computer Security
4.2.2 Security Measures
2
LEARNING OUTCOMES:
At the end of this topic, students should be able to:
Identify different ways to overcome security risks.
Security Measures
Security Measures
Anti-virus Anti-spyware
Cryptography
Data backup
Firewall
Human aspect:
awareness
1.Anti-virus
A software use to protect computers against viruses by identifying and removing any computer virus found in memory, on storage media, or in incoming files.
Example:• McAfee VirusScan• Norton AntiVirus• AVG Anti-Virus• avast! Antivirus
Most anti-virus program also protect against other malware.
Programs that detect and deletes spywareExample :
Ad-Aware Spy Sweeper Windows Defender
2.Anti-spyware
• A firewall is hardware and/or software that protects a network’s resources from intrusion
3.Firewall
Hardware firewall is a built-in feature in routers that prevents unauthorized users from accessingfiles and computers in a network.
Firewall
Firewall
• A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed– To back up a file means to make a copy of it
• Offsite backups are stored in a location separate from the computer site Cloud
Storage
4. Data backup
• Two categories of backups:– Full backup – copies
all the files in the computer
– Selective backup – choose which folder and files to include in backup
• In the case of system failure, you can restore the file by copying the backed up files to their original location on the computer.
Data backup
5.CryptographyThe art of protecting information by transforming it (encrypting it) into an unreadable format
Technology of encoding information so it can only be read by authorized individuals
Encryption
Decryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
Process to decode encrypted data
Cryptography
How ?To read the data, you must decrypt it into readable
form.The unencrypted data is called plain text.The encrypted data is called cipher text.To encrypt, plain text converted into cipher text
using an encryption key.
Importance ?The process of proving one's identity. Ensuring that no one can read the message except the
intended receiver.
Cryptography
Expose employees or staff to computer security
Make a routine check to update from new virus, worm or other malicious threat.
Proper handling of computer and information
6.Human Aspects: Awareness
Computer Security
Computer Security Risk Security MeasureInternet and network attack Anti-virus
Anti-spywareFirewall
Human Aspect-Awareness
Unauthorized access and use FirewallHuman Aspect-Awareness
Hardware theft Data backupHuman Aspect-Awareness
Software theft Data backupHuman Aspect-Awareness
Information theft Data backupCryptography
Human Aspect-Awareness
System failure Data backupHuman Aspect-Awareness
a