Lec-28

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

INFORMATION SECURITY

& PRIVACY

PRESENTED BY : 20761556-035
20761556-024
20761556-010
Information Security

 Data security is basically the process of keeping certain


information private.

 It involves the use of various methods to make sure that data is


kept confidential and safe.

 Data security ensure the integrity and the privacy of data, as


well as preventing the loss or corruption of data.
Needs of Information Security

 Many businesses hold very important and confidential data

 Hence security of data is extremely important

 Data must be safeguarded all the time


Principles

 Confeditionality
 Integrity
 Availaibility
Ways TO Protect Data(Privacy)
Ways TO Protect
Data(Privacy)
Backups

 A master file stores the static data(dose not change


frequently) found on the database

 The transaction file keeps track of all the changes


made to the database throughout the day

 At the end of the day, all the contents stored in the


transaction file are transferred to the master file in
order to update it
Physical Security

 The most obvious choice of protecting data is to keep it in a


safe locked room/building

 Protected room can be safeguarded by


 A lock and key
 ID card scanning
 Biometrics
 Using a safe
 Alarm systems
Software Safeguards

 There are many software measures which can protect data.

 The following explains some of the most common approaches


used now days
 IDS(Intrusion Detection System)
 User Id (user identification)
 Encryption
 Digital Signature
Information Privacy

 Data privacy, also called information privacy, is the aspect of information


technology (IT) that deals with the ability an organization or individual
has to determine what data in a computer system can be shared with third
parties.
 Data Encryption
 Data anonymization
 Access controls
 Privacy polices
Software Privacy

 Software privacy is also important as it stops


 End to end encryption
 Distribution
 Unauthorized use of computer software
 It is illegal to use private software yourself, to give it away, or
worse yet to sell it.
Soft-lifting

 Soft-lifting is when people buy software with a single license


and install it on more than one PC

Downloading
 Downloading a software from internet is much quicker and
easier than buying it and installing it.
Copyright

 Copyright is a protection that covers published and


unpublished
 Literary
 Scientific
 Artistic work

 Copyright laws grant only creator the right to reproduce,


prepare derivative works , distribution, perform and display the
work publicly
Software Protection

 Software developers try to protect their


software by using many different protection
measures

 Serial numbers
 Activations keys
 CD copy protection
 Hardware keys
Access rights

 Access rights control whether or not a particular user can use


or edit a program or a data file.
 Each user is assigned different rights which determine the file
that can be accessed . A user may allow a complete access to a
file or a restricted only to read the data or have no access at all.
 Network operating system provides a way of identifying
individuals .
Thank you…

You might also like