SlideShare a Scribd company logo
1
System Security
Chapter no 16
2
Computer Security
 Computer security is concerned with taking care
of hardware, Software and data
 The cost of creating data again from scratch can
hardware or program lost.
 Loss of data can have various consequences
 Bad business decision
 Loss of goodwill from customers
 Cash flow problems
 Adverse publicity from the press
 Late delivery of goods
 Failure to receive payment
3
Physical security
 Computer equipment and its data need
to be protected from physical harm
 These include natural ones such as
 Fire
 Lighting
 Water damage
 Theft
4
Computer theft
 There are many ways of making sure
that unauthorized people are denied
access to a system through use of
keyboard locks and password
 It is more difficult to prevent a thief from
picking up a system and stealing it
 Locks alarmed on circuit board and tags
are method of hardware protection
5
Preventing theft
 Note the serial no of computers and
peripherals
 Lock the computers in case and key
should be safely saved
 Data should be backed up regularly
 All staff aware of security
 All staff wear security badge which
contains their photograph, name
6
Protection from fires
 Fireproof doors help contain fire
 Use Smoke detectors
 Use gas folding systems are used in
large computer installations
7
Protection from dust and
extremes of temperature
 Air conditioning is more important for
larger mainframe system where the
temperature and humidity must be
controlled
 The air must also be pure and filtered in
this way
8
Software Security
 Viruses
 Viruses are programs the purpose of which is
to disrupt the sensible use of computer.
 Many viruses do little more than display
message on the screen
 Some are designed to act after a certain
period of time which drop off the screen or
erased the entire content of hard disk
 Viruses are able to spread from one disk to
other
9
Anti virus software
 Antivirus software can be used to scan
the computer’s memory and disks to
detect the viruses
 Any viruses detected are then removed
using the software
10
Avoiding viruses
 Don’t buy secondhand software
 Check your computer for viruses if it has
been recently repaired
 Be suspicious of all software which are
freeware ,shareware
 Not to use too many computers
 Install antivirus software which check the
hard disk every time the system is booted up
11
Backing up data
 Means taking the copy of the data and
keeping it away from the computer in a
secure place.
 It is not good keeping a back up copy on the
same disk
 The most common way to lose a file is
through user error by deleting the file
 There are software packages available to
recover such data
12
Rules of backing up
 Never keep backup disks near the computer
 One set of back up disks in a different place
 If data is expensive to recreate then invest in
a fire-proof safe to protect your backups
against theft and fire
 Placing important computer files in safe place
so that they can be found easily if needed
,which is called archiving
13
Disk failure
 All micro computers will suffer at least one serious fault during
their lifetimes
 A typical hard disk failures mean time is between 20000 to
200000 hours
 This mean if computer was used for 12 hr per day then it means
that hard disk will break down one about six years
 If a computer was used for network server then used 24 hr so its
mean break down will every 27 months
Avoiding disk failure
 Back up copies of programs and data on a hard disk should be
taken at regular interval for this tape streamers is used
 Floppy disk is also used for backup disk data
 Use two hard disks in parallel with each other
14
Protecting files
 Password is keyed in which is never shown in
screen
 Use software to limit each user’s access to
only those files that are needed for the
performance of their particular job
 To restrict access to a computer’s OS for
inexperienced users
 Restricted access can also be used to
prevent people from copying data from the
hard disk to a floppy disk
15
Encryption
 Files contain sensitive data are encrypted or coded
 If a tape or disk containing sensitive files is stolen it
would then be impossible to read the data without
decoder
 Encryption is also used when important data is
transmitted from one place to other
 The data is coded before being sent and then
decoded at the other end.
 Both processes are performed automatically by
computers
 When people are making payments for goods bought
over internet using a credit or debit card the details
are always encrypted
16
Data integrity
 Is concerned with the correctness of the data
Errors may be introduced into data in a variety
of ways They can be introduced when the
person typing in the data misreads it off a
source document or if machine errors corrupt
the data Validation and verifications checks
are performed on data to ensure its integrity
17
Data Security
 Is concerned with keeping the data safe
from the various hazards that could
destroy it.
18
Transaction Logs
 When you make changes to the data in a file
you usually delete the old information and
replace it with the new information
 If you have a bank or building society
account, money added to your account or
taken out needs to be recorded
 Each bit of business is called transaction
 The account statement showing the amounts
entering and leaving the account shows

More Related Content

What's hot (20)

PPTX
System security
sommerville-videos
 
PPT
Database security
Shivnandan Singh
 
PPTX
System security
invertis university
 
PDF
Cisco cybersecurity essentials chapter - 6
Mukesh Chinta
 
PPT
Security Measure
syafiqa
 
PDF
Maintain A Secure, Independent Network For Survey Projects
Data Force Research
 
PDF
Do not run business without protection!
Thomas Miller
 
PPTX
Database security
afzaalkhalid1
 
PPTX
System Security
Reddhi Basu
 
PPTX
Essentials of PCI Assessment
Gazzang
 
PPTX
system Security
Gaurav Mishra
 
PPTX
Compliance to privacy act and mandatory data breach reporting for corporates
e-Safe Systems
 
PDF
Notacd02
cikgushaharizan
 
PPTX
System security
ReachLocal Services India
 
PDF
Safeguard your business with Microsoft Office 365 and PlanBcp
arnoldvilleneuve
 
PDF
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
Tim O'Leary
 
PDF
Document Security
Tim O'Leary
 
PDF
It security,malware,phishing,information theft
Deepak John
 
PDF
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Seo Tss
 
PDF
Windows 10: Windows 10 de ITPros a ITPros
Juan Ignacio Oller Aznar
 
System security
sommerville-videos
 
Database security
Shivnandan Singh
 
System security
invertis university
 
Cisco cybersecurity essentials chapter - 6
Mukesh Chinta
 
Security Measure
syafiqa
 
Maintain A Secure, Independent Network For Survey Projects
Data Force Research
 
Do not run business without protection!
Thomas Miller
 
Database security
afzaalkhalid1
 
System Security
Reddhi Basu
 
Essentials of PCI Assessment
Gazzang
 
system Security
Gaurav Mishra
 
Compliance to privacy act and mandatory data breach reporting for corporates
e-Safe Systems
 
Notacd02
cikgushaharizan
 
System security
ReachLocal Services India
 
Safeguard your business with Microsoft Office 365 and PlanBcp
arnoldvilleneuve
 
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
Tim O'Leary
 
Document Security
Tim O'Leary
 
It security,malware,phishing,information theft
Deepak John
 
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Seo Tss
 
Windows 10: Windows 10 de ITPros a ITPros
Juan Ignacio Oller Aznar
 

Similar to Ch 16 system security (20)

PPTX
4.-Computer-Security for grade 10 preparation.pptx
PurnaBahadurRana1
 
PPT
data protection Google Slides Background Themes
droidchoi2024
 
PPT
IT-Part3 for icdl exams and internet .ppt
osamafouda3
 
PPTX
ICT SKILLS AND ITS TYPES WITH PROBLEMS AND SOLUTIONS.pptx
ShaliniSharma266749
 
PPTX
ict SKILLS for class 11 artificial inte
avantikamct
 
PPTX
Info systems design and development
iarthur
 
PPT
3e - Security Of Data
MISY
 
PPT
Security and privacy
Haa'Meem Mohiyuddin
 
PPT
Chap11
Aman Sharma
 
PPTX
Chap11
nitin_009
 
PDF
security By ZAK
Tabsheer Hasan
 
PDF
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
Michael Lew
 
PPT
Security and privacy
Mohammed Adam
 
PDF
Lecture5
Majid Taghiloo
 
PPTX
kmf.pptx
akashpatil146883
 
PPT
Data security
sbmiller87
 
PPT
css ppt.ppt
ShivaTyagi26
 
PPT
Maintaining Your Computer.pptdffaggfgdgfgdf
hannahjoylayus33
 
PPTX
It security
avi2607
 
PPTX
Introduction to Security (Hardware, Software, Data & Policies)
Amr Salah
 
4.-Computer-Security for grade 10 preparation.pptx
PurnaBahadurRana1
 
data protection Google Slides Background Themes
droidchoi2024
 
IT-Part3 for icdl exams and internet .ppt
osamafouda3
 
ICT SKILLS AND ITS TYPES WITH PROBLEMS AND SOLUTIONS.pptx
ShaliniSharma266749
 
ict SKILLS for class 11 artificial inte
avantikamct
 
Info systems design and development
iarthur
 
3e - Security Of Data
MISY
 
Security and privacy
Haa'Meem Mohiyuddin
 
Chap11
Aman Sharma
 
Chap11
nitin_009
 
security By ZAK
Tabsheer Hasan
 
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
Michael Lew
 
Security and privacy
Mohammed Adam
 
Lecture5
Majid Taghiloo
 
Data security
sbmiller87
 
css ppt.ppt
ShivaTyagi26
 
Maintaining Your Computer.pptdffaggfgdgfgdf
hannahjoylayus33
 
It security
avi2607
 
Introduction to Security (Hardware, Software, Data & Policies)
Amr Salah
 
Ad

More from Khan Yousafzai (20)

PPT
14 data logging
Khan Yousafzai
 
PPT
09.1 types of computer operation
Khan Yousafzai
 
PPT
8.2 system analysis and design
Khan Yousafzai
 
PPT
8.1 alogorithm & prolem solving
Khan Yousafzai
 
PPT
Ch 26 the internet
Khan Yousafzai
 
PPT
Ch 22 the electronic office
Khan Yousafzai
 
PPT
Ch 21 computer and your health
Khan Yousafzai
 
PPT
Ch 19. social and economic effects of it
Khan Yousafzai
 
PPT
Ch 17 data protections act
Khan Yousafzai
 
PPT
Ch 15 .networks and communications
Khan Yousafzai
 
PPT
Ch 14. weather forecasting ( application of data logging)
Khan Yousafzai
 
PPT
Ch 13 system analysis
Khan Yousafzai
 
PPT
Ch 12 describing information system
Khan Yousafzai
 
PPT
Ch 11 ways of presenting data
Khan Yousafzai
 
PPT
Ch 9 types of computer operations
Khan Yousafzai
 
PPT
Ch 8 data base
Khan Yousafzai
 
PPT
Ch 6 collecting your data
Khan Yousafzai
 
PPT
Ch10 data transfer
Khan Yousafzai
 
PPT
23 simulations
Khan Yousafzai
 
PPT
18 computers and the law
Khan Yousafzai
 
14 data logging
Khan Yousafzai
 
09.1 types of computer operation
Khan Yousafzai
 
8.2 system analysis and design
Khan Yousafzai
 
8.1 alogorithm & prolem solving
Khan Yousafzai
 
Ch 26 the internet
Khan Yousafzai
 
Ch 22 the electronic office
Khan Yousafzai
 
Ch 21 computer and your health
Khan Yousafzai
 
Ch 19. social and economic effects of it
Khan Yousafzai
 
Ch 17 data protections act
Khan Yousafzai
 
Ch 15 .networks and communications
Khan Yousafzai
 
Ch 14. weather forecasting ( application of data logging)
Khan Yousafzai
 
Ch 13 system analysis
Khan Yousafzai
 
Ch 12 describing information system
Khan Yousafzai
 
Ch 11 ways of presenting data
Khan Yousafzai
 
Ch 9 types of computer operations
Khan Yousafzai
 
Ch 8 data base
Khan Yousafzai
 
Ch 6 collecting your data
Khan Yousafzai
 
Ch10 data transfer
Khan Yousafzai
 
23 simulations
Khan Yousafzai
 
18 computers and the law
Khan Yousafzai
 
Ad

Recently uploaded (20)

DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PDF
Tips for Writing the Research Title with Examples
Thelma Villaflores
 
PPTX
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PDF
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
PPTX
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
PPTX
Introduction to Probability(basic) .pptx
purohitanuj034
 
PPTX
Applied-Statistics-1.pptx hardiba zalaaa
hardizala899
 
PPTX
YSPH VMOC Special Report - Measles Outbreak Southwest US 7-20-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
ENGLISH 8 WEEK 3 Q1 - Analyzing the linguistic, historical, andor biographica...
OliverOllet
 
PPTX
LDP-2 UNIT 4 Presentation for practical.pptx
abhaypanchal2525
 
PPTX
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PDF
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Tips for Writing the Research Title with Examples
Thelma Villaflores
 
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
Introduction to Probability(basic) .pptx
purohitanuj034
 
Applied-Statistics-1.pptx hardiba zalaaa
hardizala899
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 7-20-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
ENGLISH 8 WEEK 3 Q1 - Analyzing the linguistic, historical, andor biographica...
OliverOllet
 
LDP-2 UNIT 4 Presentation for practical.pptx
abhaypanchal2525
 
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
Basics and rules of probability with real-life uses
ravatkaran694
 

Ch 16 system security

  • 2. 2 Computer Security  Computer security is concerned with taking care of hardware, Software and data  The cost of creating data again from scratch can hardware or program lost.  Loss of data can have various consequences  Bad business decision  Loss of goodwill from customers  Cash flow problems  Adverse publicity from the press  Late delivery of goods  Failure to receive payment
  • 3. 3 Physical security  Computer equipment and its data need to be protected from physical harm  These include natural ones such as  Fire  Lighting  Water damage  Theft
  • 4. 4 Computer theft  There are many ways of making sure that unauthorized people are denied access to a system through use of keyboard locks and password  It is more difficult to prevent a thief from picking up a system and stealing it  Locks alarmed on circuit board and tags are method of hardware protection
  • 5. 5 Preventing theft  Note the serial no of computers and peripherals  Lock the computers in case and key should be safely saved  Data should be backed up regularly  All staff aware of security  All staff wear security badge which contains their photograph, name
  • 6. 6 Protection from fires  Fireproof doors help contain fire  Use Smoke detectors  Use gas folding systems are used in large computer installations
  • 7. 7 Protection from dust and extremes of temperature  Air conditioning is more important for larger mainframe system where the temperature and humidity must be controlled  The air must also be pure and filtered in this way
  • 8. 8 Software Security  Viruses  Viruses are programs the purpose of which is to disrupt the sensible use of computer.  Many viruses do little more than display message on the screen  Some are designed to act after a certain period of time which drop off the screen or erased the entire content of hard disk  Viruses are able to spread from one disk to other
  • 9. 9 Anti virus software  Antivirus software can be used to scan the computer’s memory and disks to detect the viruses  Any viruses detected are then removed using the software
  • 10. 10 Avoiding viruses  Don’t buy secondhand software  Check your computer for viruses if it has been recently repaired  Be suspicious of all software which are freeware ,shareware  Not to use too many computers  Install antivirus software which check the hard disk every time the system is booted up
  • 11. 11 Backing up data  Means taking the copy of the data and keeping it away from the computer in a secure place.  It is not good keeping a back up copy on the same disk  The most common way to lose a file is through user error by deleting the file  There are software packages available to recover such data
  • 12. 12 Rules of backing up  Never keep backup disks near the computer  One set of back up disks in a different place  If data is expensive to recreate then invest in a fire-proof safe to protect your backups against theft and fire  Placing important computer files in safe place so that they can be found easily if needed ,which is called archiving
  • 13. 13 Disk failure  All micro computers will suffer at least one serious fault during their lifetimes  A typical hard disk failures mean time is between 20000 to 200000 hours  This mean if computer was used for 12 hr per day then it means that hard disk will break down one about six years  If a computer was used for network server then used 24 hr so its mean break down will every 27 months Avoiding disk failure  Back up copies of programs and data on a hard disk should be taken at regular interval for this tape streamers is used  Floppy disk is also used for backup disk data  Use two hard disks in parallel with each other
  • 14. 14 Protecting files  Password is keyed in which is never shown in screen  Use software to limit each user’s access to only those files that are needed for the performance of their particular job  To restrict access to a computer’s OS for inexperienced users  Restricted access can also be used to prevent people from copying data from the hard disk to a floppy disk
  • 15. 15 Encryption  Files contain sensitive data are encrypted or coded  If a tape or disk containing sensitive files is stolen it would then be impossible to read the data without decoder  Encryption is also used when important data is transmitted from one place to other  The data is coded before being sent and then decoded at the other end.  Both processes are performed automatically by computers  When people are making payments for goods bought over internet using a credit or debit card the details are always encrypted
  • 16. 16 Data integrity  Is concerned with the correctness of the data Errors may be introduced into data in a variety of ways They can be introduced when the person typing in the data misreads it off a source document or if machine errors corrupt the data Validation and verifications checks are performed on data to ensure its integrity
  • 17. 17 Data Security  Is concerned with keeping the data safe from the various hazards that could destroy it.
  • 18. 18 Transaction Logs  When you make changes to the data in a file you usually delete the old information and replace it with the new information  If you have a bank or building society account, money added to your account or taken out needs to be recorded  Each bit of business is called transaction  The account statement showing the amounts entering and leaving the account shows