0% found this document useful (0 votes)
32 views19 pages

Computer System Security

The document discusses various ways that data integrity and security can be compromised and methods that can be used to protect data integrity and security. It covers topics like passwords, encryption, firewalls, biometric security, and the risks of viruses and unauthorized access.

Uploaded by

abednigo titus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views19 pages

Computer System Security

The document discusses various ways that data integrity and security can be compromised and methods that can be used to protect data integrity and security. It covers topics like passwords, encryption, firewalls, biometric security, and the risks of viruses and unauthorized access.

Uploaded by

abednigo titus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 19

Many companies have lost millions of dollars

because of corrupted data, lost data and


computer down time.
This gave rise to the need of security of data
because all the above occurred because of
cyber crime in most instances.
 It refers to the validity of data, this means
data being complete and accurate even after
processing.
 Data security means keeping it safe.
 Data integrity can be compromised in
several ways that is why there is need for
security.
 Some of the ways are:
Inaccurate data entry
Viruses
Hardware malfunction
Natural disasters like flood and fire
Accidental or malicious deletion of data
Data integrity is mainly compromised by
individuals who access a network illegally and
by virus infections that are normally spread
from one computer to the other.
Different individual would want to access and
sometimes corrupt the critical data held by a
company.
The individuals involved in computer crimes
are classified as follows:
Hacker: a hacker only accesses a network
illegally just to view critical information
Cracker: accesses the network illegally with
the intention to destroy data, steal
information and other malicious acts.
Script kiddie: mostly teenagers who use pre
written cracking programs
 Unauthorized access of different networks
needed to be controlled so designers
developed means of securing different
networks from such.
 The use of passwords was introduced
 One can even restrict access to a file by
means of a password.
 Data can also be encrypted or scrambled.
 Firewalls have been introduced as well
 Possessed objects-Access cards
 Biometric devices- Fingerprint, Iris, tongue
print.
 Most of the systems today are accessed
through the use of usernames and
passwords.
 A password has to be something that you
can easily remember and so it can be
predictable to the people who know since
people normally use their birthdates, their
spouse name etc
 A password has to be long for it to be
difficult to crack, the shorter the password
the easier it will be to predict.
 Though they serve their purpose there are
loopholes as mentioned above
 Each file can be protected using a password
to open it and to modify it.
 In the save as window there is where it’s
written tools and an arrow facing down,
when that arrow is clicked a drop down
menu comes and in this menu there is
security options.
 This is a feature that was made by Microsoft
for its application programs like word,
PowerPoint.
 This method does not require a password to
delete a file so without backup the data can
be lost.
 Data in here is scrambled or encoded so
that whoever access it illegally cannot be
able to read it or make sense out of it.
 For this data to be readable it has to be

decoded with an encryption key which will


be held by the right person to access the
data.
 It does not necessarily avoid crackers to

access the file but even if they do they wont


make sense out of the data.
 This can be either a software of hardware that
is connected to a network and its main
function is to filter the data that gets in to a
system before it gets in.
 Some examples are black ice and MacAfee
 Here security is ensured by giving legitimate
users objects like the access cards and ATM
cards to be able to use the system.
 If this object gets lost, for example an access
card other people can take it and be able to
access the system and do whatever they one
and it will appear as if the are legitimate
users.
 These are machines that are able to give
access to a user by scanning the iris, the
finger prints, voice recognition and the face.
 Biometric devices are good but they can

sometimes deny the rightful user access.


Cut finger, swollen face or eye etc
 It is a malicious logic program that run
without the user’s knowledge to alter the
computer operations and destroy files.
 A computer can also be infected by a

program that replicates itself to use


resources like memory and might end up
shutting down the computer called a worm.
 Screen displaying unusual messages mostly
insults.
 Existing files disappearing without being
deleted by the user.
 Programs not working well like failing to
load.
 Unknown files mysteriously
 Unusual sounds and music.
 Programs closing without any input from
the user
 Viruses normally spread by the use of disks
from one computer to the other and the
internet.
 If you use a memory stick on an infected
computer the virus saves itself in this disk
and then when you insert this removable disk
in another computer the virus is transferred
to this other computer sometimes even
before you open any file
 On the internet the viruses are spread
through the free software and executable
files.
 Whenever you run any program or file that
is infected the virus is spread.
 Connecting an unprotected computer to a
network is also very risky.
 Opening mail from unknown senders also
can help to spread viruses.
 Softwares that come accompanying books
DO NOT OPEN MAIL FROM AN UNKNOWN SENDER
 Do not open files from the internet with these
extensions exe, vbs.
 If the computer is already infected that use an
antivirus to delete the virus and heal the infected
files.
 An antivirus is a software that has virus definitions
or signatures and needs to updated regularly to be
effective.
 This is because the people who invent virus come
with new ones almost on daily basis so if your
antivirus is not up to date then it can not detect
new versions of the virus thus it will reside with the
virus and your files will be destroyed.
 This means protecting the physical parts of the
computer or hardware.
 Lock computer cables
 Lock doors
 Install alarm system
 Use access cards to grant a user access to the
computer lab
 Air condition the room
 Install cameras
 Note serial numbers because that’s what can be
used to find a stolen computer
 Use fire proof doors
 There was a data protection act that was
passed back in 1998 and it states that:
• Data must not be used for any purpose other
than what it is intended
• Data must be updated to maintain integrity
• Individuals have a right to check data held
about them
• Protection from unauthorised access and use

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy