Methods

24
METHODS USE TO ENHANCE THE VALUE OF INFORMATION

Transcript of Methods

Page 1: Methods

METHODS USE TO

ENHANCE THE VALUE

OF INFORMATIO

N

Page 2: Methods

Either way, organisations cannot function without accurate information, and they do not want unauthorized people getting into the system and changing information .

In addition, much of this data is used in the organisations decision making and problem solving .

Page 3: Methods

Organizations need to secure not only their data but also the systems on which the data is stored.

They need protection from natural disasters acts of sabotage, theft and unlawful access.

Page 4: Methods

ACCESS CONTROL

Page 5: Methods

Organisations generally protect their hardware and software by restricting access to the areas in which the computer itself.

This is sometimes done by means of doors that cannot be opened without a PIN, this number being known only by certain people.

Page 6: Methods

Encryption

Is the transforming of normal text, which can be read by all, into something that requires a code or decryption key.

Page 7: Methods

Symmetric encryption

Is the traditional encryption method and relies on both the sender and the receiver of a message knowing the key.

How ever, if a key is used by two people who are considerable distance apart, then at some stage the key must be transmitted to the receiver.

Page 8: Methods

Asymmetric or public key encryption This kind of encryption uses

different keys to encrypt and decrypt.

This system gives all users a public key that all know and can use and a private key that is secret.

A message is encrypted using the public key and the private key is used to decrypt the message.

At no point is the private key transmitted by electronic methods to anyone.

Page 9: Methods

PASSWORD Most organization use a

password system that requires a user to enter a name and password to log on the system.

This system of identification and access control is also adopted in networks giving each user different privileges.

Passwords can also be used on individual files.

Page 10: Methods

ACCESS CARDS

By using swipe cards and proximity cards, employees can gain access to buildings and specialized areas, depending on the privileges allowed by that card.

Page 11: Methods

ACTIVE BADGES

Active badges restrict access by tracking an employee’s location using their badge.

Employees and their whereabouts can be monitored by a central system that knows where they are at any given time.

Page 12: Methods

FIREWALLS Are type of software

designed to protect files and data from unauthorized, external access of a network through the internet.

Firewalls have a range of features, including access control through passwords and encryption, and a log that records all unauthorized access attempt.

Page 13: Methods

BIOMETRICS Refers to the automatic

identification of a person based on a certain physiological or behavioral characteristics.

This method is growing in popularity over the above methods because the person to be identified is required to be physically present at the point of identification.

Page 14: Methods
Page 15: Methods

By replacing PIN’s and passwords with biometrics techniques, the risk of unauthorized access and fraudulent use is decreased.

Biometric identification can be applied to a range of technology, such as ATM’s’ mobile phone phones, smart cards and desktop computers.

Page 16: Methods

AN AUTOMATED BIOMETRIC DEVICE HAS

THREE MAJOR COMPONENTS:

Page 17: Methods

1.A mechanism to scan and capture an image of the characteristics

2. compression, processing and comparison of the image

3. an interface with application system

Page 18: Methods

OTHER BIOMETRIC METHODS:

Page 19: Methods

voice- matches the sound patterns of someone speaking their name or passwords to those file.

facial identification- converts a facial image on video to a digital one and compares it with one on file.

fingerprints- compares the ridges on fingers with those in a central database.

palm prints- compares the ridges on a palm with those on a database

Page 20: Methods

hand veins- scans the vein pattern on the back on the hand

handwriting acoustic emissions- analyses sounds generated with someone signs their name

iris- a video image of the coloured part of the eye is mapped by the computer and each person is given an individual code based on their iris pattern.

Page 21: Methods
Page 22: Methods
Page 23: Methods
Page 24: Methods

The end!!!!Presented by:

Mary Jesette E. PenaojasBLIS-III

Presented to: Mrs. Sheryl C.

Farquerabao