The
precautionary measures taken toward possible danger or damage.
DATA BACKUP
•A data backup is the result of copying or archiving files
and folders for the purpose oF
being able to restore them in case of data loss.
•Data loss can
be caused by many things ranging from computer
viruses, hardware
failures, file corruption, system failure or theft.
•If
you are responsible for business data, a loss may involve critical financial,
customer,
and company data.
•If
the data is on a personal computer, you
could lose financial data and other key
files,
pictures, music and others that would be hard to replace.
CRYPTOGRAPHY
*Cryptography is technology of encoding
information so it can only be read by
authorized
individuals.
*Encryption is process of converting
readable data into unreadable characters to
prevent unauthorized access.
*Decryption is process to recorded encrypted data.
How…
-To read
the data, you must decrypt it into readable form.
-The unencrypted data
is called plain
text.
-The encrypted data
is called cipher
text.
-To
encrypt, plain text converted into cipher
text
using an encryption key.
Importance…
-The
process of proving one's identity.
-Ensuring
that no one can read the message except
the
intended receiver.
-Assuring
the receiver that the received message has
not been altered in anyway
from the original.
-A
mechanism to prove that the sender really
sent this message.
ANTI-VIRUS
•Anti-virus software is a program or set of programs that are
designed to
prevent, search for, detect and remove software
viruses and other malicious software
like
worms, Trojan horses, adware and more.
•If
and when a virus
is detected, the computer displays
a warning asking
what action should
be done, often giving the options to
remove, ignore, or move the file to
the vault.
•If
a virus infected a computer without an antivirus program, it may delete
files, prevent access to files, send spam, spy on you, or perform other
malicious actions.
•Examples: Norton anti-virus, AVG
anti-virus, Kaspersky anti-virus
ANTI-SPYWARE
•Anti-spyware is a type of software that is
designed to detect and remove unwanted
spyware
programs.
•Anti-spyware software can be used to
find and remove spyware that has already been
installed on the user's computer.
•OR
it can act much like an anti-virus program by providing
real-time protection and
preventing spyware from being downloaded in the first
place.
•Examples
:
-Spyware Blaster
-Spy Sweeper
FIREWALL
•A
firewall is a system designed to
prevent unauthorized access to or from a private
network.
•A
firewall
can be implement either
through hardware
or software form, or a combination
of both.
•Firewalls
prevent
unauthorized Internet users from
accessing
private networks
connected to the Internet, especially intranets.
•All messages entering or leaving the intranet
(i.e., the local network to which you are
connected) must
pass through the firewall,
which examines each message and blocks those
that do not meet the specified
rules/security criteria.
•Rules will decide who can connect to the internet,
what kind of connections can be made,
which or what kind of files can be
transmitted in out.
PHYSICAL ACCES CONTROL
•Lock your laptop whether you're at home, in a dorm,
in an office, or sitting in a coffee
shop, use a security device, such as a
laptop security cable.
•Lock
doors and windows, usually adequate to protect the
equipment.
•Put the access code at the door to enter the computer room or
your office.
•Put
the CCTV (closed-circuit television) in
your office or computer room.
•Make
a policies who can access the computer room
or your data center.
No comments:
Post a Comment