SECUIRTY
OF
INFORM DONE BY GROUP 7
MATION S.O17
SYSTEM
Securing Your Digital World
What is Cyber security is the protection
of systems connected to the
DATA internet, including software,
hardware, and data.
Security?
A password is a secret code or
WHAT IS A phrase used to authenticate a
PASSWORD user's identity and grant them
access to a system or data. They as
a primary method to control who
can access sensitive information.
Authentication is the process of
verifying the identity of a user,
device, or process trying to
access a system.
Encryption is the process of using a
mathematical algorithm to convert data
into a scrambled unreadable format called
ciphertext. Only authorized parties with the
correct decryption key can access the
original data, essentially acting as a digital
lock on data
DATA
CORRUPTION
Any unintended alteration
or damage to digital data,
rendering it unusable or
unreliable. This is often
caused by hardware
malfunctions, software
bugs, network issues, or
malicious activity.
SECURITY
MECHANISMS IN
INFORMATION
TECHNOLOGY
•Comparing Physical and Logical Access Control
Measures S.O 16
Introduction to Security
Mechanisms
Security Both work
mechanisms Divided into together to
protect data physical and ensure safety
and access to logical security and integrity of
systems. controls. data.
Examples:
1 Locks & Keys
Physical 2 Swipe or Key Cards
Access 3
Biometric Scanners
Control
WHAT IS A LGOICAL ACCESS
CONTROL
Protects access to digital systems and networks.
EXAMPLES
1 2 3
Multi-Factor
Passwords Authentication Encryption
(MFA)
CHARACTERISTICS
OF AN EFFECTIVE
PASSWORD
-Should not be obvious
or easy to guess
-Should have a mixture of uppercase
and lowercase letters, numbers,
symbols
Examples:
EXAMPLES
WEAK
STRONG
'P@ssw0rd!2024'
'123456'
'password' L77@ARCHI///
Definition AUTHENTICATION
Confirms a user’s
METHODS
identity before granting
access.
EXAMPLES EXAMPLE
- Single-Factor - Two-Factor
Authentication (SFA) Authentication (2FA)
- Biometric
Authentication
ENCRYPTION
Converts data into unreadable form to prevent unauthorized
access.
EXAMPLES
- AES Encryption (used in WhatsApp)
- SSL/TLS (used in online banking)
DATA INTEGRITY
• Ensures data remains accurate
and unchanged.
EXAMPLES
Checksums & Hashing
Digital Signatures
CONCLUSION
• Both physical and logical
access control are crucial.
• Use strong passwords,
encryption, and authentication
to protect data.
•Implement physical security
measures like biometrics and
key cards.