Computer & Data Security: Rotecting AND Ecuring Nformation

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

COMPUTER & DATA SECURITY

PROTECTING AND SECURING INFORMATION


COMPUTER SECURITY

Computers and computer networks hold vast amounts of


information, all of which have to be kept safe and accurate.
COMPUTER SECURITY

Data that is not accurate is not useful at all. Data can be


inaccurate for a number of reasons:
The data may have been entered incorrectly
Data may have been accidentally altered
Data didn’t get updated wen it was suppose to
Data was deliberately changed for malicious reasons
DATA INTEGRITY

IF DATA IS ACCURATE WE SAY THAT IT HAS INTEGRITY.


DATA INTEGRITY IS ACHIEVED WHEN ALL DATA IS UP TO DATE
AND ACCURATE.
DATA SECURITY

DATA SECURITY COVERS ALL THE


METHODS THAT CAN BE USED TO KEEP
DATA SAFE AND ACCURATE.
DATA SECURITY
NUMEROUS METHODS ARE USED TO PROTECT AND SECURE
INFORMATION. THE MOST WIDELY USED OF THESE ARE:

 SOFTWARE ACCESS  PHYSICAL ACCESS


RESTRICTION RESTRICTION
FIREWALLS SECURITY GUARDS
PASSWORDS KEY CARDS/PASS
FILE ENCRYPTION CARDS/ID C ARDS
VIRUS PROTECTION BIOMETRICS
FIREPROOF CABINETS
SOFTWARE RESTRICTION

This is the process of


restricting access to software;
this may be done using
passwords or encryption or
Installation keys.
PASSWORDS

A password is a combination of
characters used to prevent
unauthorised computer access.

A person wishing to secure a computer or individual files


on the computer can set a password. In order for access to
be granted, the correct password must be entered.
ENCRYPTION
Encryption is the process of encoding
information so that it bears no
similarity to the original in order to
secure it.
Decryption is the process of decoding encrypted
information in order to obtain the original information.
FIREWALL

A firewall is a program that identifies


certain weaknesses in networked
computers and tries to prevent them
from being exploited.

This makes it much more difficult (but not impossible) for


hackers to gain unauthorised access to the computer
VIRUS

A virus is a malicious program that is


designed to corrupt the files on a
person’s computer and/or prevent the
computer from working properly.
A computer virus will spread from one infected file or
computer to another.Viruses may cause damage to
programs and data. The way this damage is done and the
method of transmission depends on the virus.
VIRUS

Computers may be protected from viruses by avoiding


using computers or disks that are suspected of having a
virus by using up-to-date anti-virus software.
VIRUS

An anti-virus or virus guard is a special type of software


that tries to detect and remove viruses that are on a
computer or removable storage media. New viruses come
out every day, so virus-guards need to be kept up to date.
PHYSICAL ACCESS RESTRICTION

Physical access restrictions are


used to prevent unauthorized
persons from gaining physical
access to stored information
SECURITY CARDS

All persons trying to access


buildings wit computer systems
tat stores important data, must
report to a security guard.
The guard will only allow
authorized persons to enter
usually wit an approved ID card
KEY CARDS/PASS CARDS/ID CARDS

Key pad – this requires persons


to key in a code to gain access
to a room or building.

Key cards /Pass cards/ID Cards


– this requires persons to swipe
a card by a pad to gain access.
BIOMETRICS

This is a very secure form of physical


access restriction. Biometrics is the
use of a person’s body characteristics
to uniquely identify him or her.

Examples include iris/retina scan,


fingerprint, handprint and they are
used to gain access to locked areas
that are usually top secret
LOCKS & VAULTS

A fireproof cabinet is a cabinet that is


designed to withstand the high
temperatures of a fire.

When things that would ordinarily


burn (or melt) very easily, e.g. paper
or disks, are placed inside one of
these, they are also protected from
fire
BACK UP & RECOVERY

Backing up data is the process of


making a copy of the data and storing
it on another storage medium

If the original data is lost, misplaced


or destroyed, it can be recovered by
copying the back-up onto the
computer
ARCHIVING

When data has remained unchanged


for a long time and is not accessed
on a regular basis, it is said to be
inactive. If this data is taking up
valuable space (which is very likely),
you might want to store it in a
separate location instead. This is what
is known as archiving.
ARCHIVING

This also refers to when a second


back-up of a file is kept separately
from the working back-up copy.
DATA CORRUPTION

When something causes data to become lost or damaged,


this data is said to be corrupted. Data can be corrupted by:
 A computer virus
 Wilful acts of employees
 Computer malfunction
 Power surges or outages
 Poor methods for updating data
DATA CORRUPTION

Ways to reduce the risk of corruption:


• Minimising the risk of computer malfunction by
performing periodic computer maintenance and keeping
the computer in a cool room away from smoke and dust
• Using surge protectors and uninterrupted power supply
units
• Performing quality control audits to minimise wilful
corruption
• Installing anti-virus software
JUST FOR YOUR
INFORMATION
CYBER SECURITY
Cybersecurity is the protection of
Internet-connected systems, including hardware,
software, and data from cyber attacks. It is made up of
two words one is cyber and other is security.

Cyber is related to the technology which contains


systems, network and programs or data. Whereas
security related to the protection which includes
systems security, network security and application and
information security.
HOW CYBER
SECURITY WORKS?

You might also like