Computer Security Measures
-
Upload
anniekhor2 -
Category
Documents
-
view
223 -
download
0
Transcript of Computer Security Measures
-
7/31/2019 Computer Security Measures
1/17
-
7/31/2019 Computer Security Measures
2/17
SMJK CHIO MIN
CLASS 4A & 4TM3
OBJECTIVES CONTENTS
SUMMARY EVALUATION
-
7/31/2019 Computer Security Measures
3/17
OBJECTIVES
At the end of the lesson, students should be able to
Select the appropriate security measures to overcomethe identified computer threats: antivirus, anti-spyware, firewall, data backup, and humanaspects.
Describe the impact of ICT on society.
-
7/31/2019 Computer Security Measures
4/17
3.3 security measures
SecurityMeasures
Anti-virus
Cryptography
HumanAspect
Anti-spyware
DataBackup
Firewall
-
7/31/2019 Computer Security Measures
5/17
Anti-virus
Anti-virus is an utility program that we use to protecta computer against viruses by identifying andremoving computer viruses found in the computer
memory, computer storage or incoming e-mails files.
Examples of antivirus are Norton
AVG Kaspersky
Avira
Bitdefender
-
7/31/2019 Computer Security Measures
6/17
Anti-spyware
Anti-spyware is an utility program that we use toprotect the computers from spyware
Spyware is designed secretlyrecord and report anindividuals activities on the internet.
It enters your systems through internet when you opene-mail or download software.
Examples of antispyware program are Spybot Searchand Destroy, Ad-ware and Spyware Blaster.
-
7/31/2019 Computer Security Measures
7/17
Firewall
Firewall is a piece of hardware or software whichfunctions in a networked environment to prevent somecommunications forbidden by security policy.
We use firewall to prevent hacking (unauthorizedaccess is the use of a computer or network withoutpermission).
-
7/31/2019 Computer Security Measures
8/17
Data Backup
Backup is utility program that makes a copy of all filesor selected files that have been saved onto a disk.
Backup Data is to ensure our data can still be used ifthe original is corrupted and prevent our files frommalicious program.
-
7/31/2019 Computer Security Measures
9/17
Cryptography
Cryptographyis a process of transforming plaintextinto ciphertext then back again.
Encryption is a process of converting plaintext intociphertext.
Decryption is the process of converting ciphertextinto plaintext.
We use cryptographyto secure the information andprevent hacking or unauthorized access.
-
7/31/2019 Computer Security Measures
10/17
Cryptography
I love ICTso much
Plaintext
MRNMEREOGOSANOW
Ciphertext I love ICT
so much
Plaintext
DECRYPTION
ENCRYPTION
-
7/31/2019 Computer Security Measures
11/17
Human Aspects
Human Aspects refer to the user and also the intruderof a computer system.
Human aspect security is the hardest aspects to giveprotection to. Lack of achieving a good informationsecurity procedure.
Three ways of security through human aspects are Organization self awareness
Organization user self awareness
Individual user self awareness
-
7/31/2019 Computer Security Measures
12/17
3.4. current and future
development
Impact of ICT in society
Computer helps people to do their work fasterand more efficient by using the softwareapplication that consist of special program for
specific tasks.
-
7/31/2019 Computer Security Measures
13/17
-
7/31/2019 Computer Security Measures
14/17
activity
Move in a group of three
Get A4 paperfrom teacher
Discuss in your group about
your invention Draw the draft
-
7/31/2019 Computer Security Measures
15/17
The Racing Game of Knowledge
Continue
-
7/31/2019 Computer Security Measures
16/17
-
7/31/2019 Computer Security Measures
17/17
summary There are several appropriate security measures to
overcome the identified computer threats: antivirus,anti-spyware, firewall, data backup, cryptography
and human aspects.
Impact of ICT on society including:
Home and education
Business
Graphics & multimedia
Communication