0% found this document useful (0 votes)
49 views6 pages

Security

Computer security refers to protecting hardware, software, networks, and data from unauthorized access or hacking. Security can be compromised through worms, viruses, spyware, and hacking. To protect systems and data, organizations use measures like antivirus software, firewalls, encryption, password protection, physical security, and regular data backups stored separately from the main system. Security is especially important when transmitting confidential information over the internet, for financial accounts, and on home networks and computers.

Uploaded by

HoodFiga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views6 pages

Security

Computer security refers to protecting hardware, software, networks, and data from unauthorized access or hacking. Security can be compromised through worms, viruses, spyware, and hacking. To protect systems and data, organizations use measures like antivirus software, firewalls, encryption, password protection, physical security, and regular data backups stored separately from the main system. Security is especially important when transmitting confidential information over the internet, for financial accounts, and on home networks and computers.

Uploaded by

HoodFiga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6

By: Tania Samnani

Security refers to the


protection of hardware,
software, machines and
networks from unauthorized
access, alteration or
destruction.


Computer security is the
process of preventing and
detecting unauthorized use of
the computer. Security
measures help to stop other
users from breaking into the
computer system.
Security can be compromised in
several ways:

Worm - a software program that is designed to copy itself
from one computer to another without human interaction.
Unlike a computer virus, a worm can copy itself
automatically.

Virus - a small software program that spreads from one
computer to another and that disturb computer operation. It
can corrupt or delete data on a computer. It is most easily
spread by attachments in e-mail.

Spyware - a software that performs without the permission
such as advertising, collecting personal information, changing
the configuration of the computer. It can make changes on
the computer which can cause the computer slow down or
crash.

Hacking - the practice of modifying computer hardware
and software by accessing the computer or network without
legal authorization

Phishing and Pharming

Physical Security: Protection from theft, fire,
flood, dust and extremes of temperature.
Important computers are placed in secure
rooms, sometimes with devices such as
biometric scanners, to limit physical access.

Password Security: Access to a computer or
a network of computers requires a password to
be present, usually with a username specific to
the person attempting to gain access to the
network. Levels of access can be attached to
the username allowing a junior member of staff
to be restricted to a lower level of data than
senior management through the principles of
groups.


What security measures can you take to protect your data?
Software security: Viruses are
numerous and often contaminate and
destroy software and files. Anti-virus
software can be used to scan a
computers memory and files downloaded
from the Internet: firewall, digital
certificates..etc

Encryption a key is used to encode
the data in such a way that the data
cannot be viewed again without the key.

Backing up data: This means taking a
copy of the data and keeping it in a
different location in a secure place.
Where do you use security?
It is mainly implemented very the
information has to be confidential.

On internet: especially the Wireless mode.
On your banking accounts; atms, credit
cards etc
On your home computer and networks.

You might also like