Download Data Security

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Access control wikipedia , lookup

Information privacy law wikipedia , lookup

Wireless security wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Mobile security wikipedia , lookup

Computer virus wikipedia , lookup

Security-focused operating system wikipedia , lookup

Data remanence wikipedia , lookup

Malware wikipedia , lookup

Cyberattack wikipedia , lookup

Computer security wikipedia , lookup

Cybercrime wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Data Security
Unauthorized Access
Natural disaster
Accidentals Destruction ( Hard
ware failure )
Natural disaster
Accidentals Destruction
( Hardware failure )
Back up
Mostly protect data from natural
disasters
Unauthorized Access
• Passwords
• Locks
Some computers may have locks on
them.
• Biometrics Locks.
Bio Matrix system- to protect data
from unauthorized access
Pass word- to protect from
unauthorized access
• Theft of data.
passwords
locks
encryption
Hackers
• someone who can gain
unauthorized access to
other computers.
• This can be as simple
as figuring out
somebody else's
password or as
complex as writing a
custom program to
break another
computer's security
software.
DATA SAFETY
• Hacking
•
Hackers can change files or can make
transactions.
• We can protect our data from hackers by
using fairwall.
• Viruses
• a program or part of code that is loaded
onto your PC without your knowledge &
runs against your wishes.
virus
• Computer viruses are programs written by
"mean" people.
• Some viruses are programmed specifically
to damage the data on your computer by
corrupting programs, deleting files, or even
erasing your entire hard drive.
Trojan Horses
• A trojan horse is not a virus. It is a
program that you run because you think it
will serve a useful purpose such as a
game or provides entertainment. Like a
"trojan horse"
• A trojan horse does not replicate or spread
like a virus.
• Trojan Horses
•
a destructive program that
masquerades as a benign application.
Unlike viruses, Trojan horses don’t
replicate themselves.
• Worms –a program or algorithm that
replicates itself over a computer network &
usually performs malicious actions,
Antivirus
Hardware protection
• UPS (uninterrupted power
supply )-to avoid the risk of
sudden power failure and
fluctuations
• Stabilizer – to control the voltage
• Surge protection- to protect
agents lightning and thundering
• Surge protection to protect against
lightening & thunder.
• Stabilizer –To control the voltage.
COMPUTER & SECURITY
We can mainly divided computer
& security for the 3 parts.
computer safety.
data safety.
our safety.
• Hardware protecting
UPS –(uninterrupted power supplier)
To avoid risk of sudden power failure&
fluctuations,
Computer security
•
•
•
•
•
Physical security
Environment should be....
1) dust free
2) Dry
3) smoke free
COMPUTER SECURITY
• Physical security
dust free
dry
smoke free