SlideShare una empresa de Scribd logo
1 de 30
Computer Concepts – Illustrated 8 th  edition Unit F: Data Security
Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition Computer Concepts – Illustrated 8th Edition
Objectives (continued) ,[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition Computer Concepts – Illustrated 8th Edition
Knowing What Can Go Wrong ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Knowing What Can Go Wrong (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Computer Concepts – Illustrated 8th Edition Figure F-3: Troubleshooting guidelines
Protecting Computer Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Computer Concepts – Illustrated 8th Edition Figure F-4: A locking device Figure F-5: A security plate
Protecting Computer Systems (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Understanding Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Computer Concepts – Illustrated 8th Edition Figure F-9: Retinal scans are a form of biometric authentication
Understanding Authentication (continued) ,[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Exploring Security Threats and Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Computer Concepts – Illustrated 8th Edition Figure F-13: A simulated worm attack
Exploring Security Threats and Malware (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Exploring Security Threats and Malware (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Avoiding Security Threats and Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Avoiding Security Threats and Malware (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Avoiding Security Threats and Malware (continued) ,[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Examining Network and Internet Access Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Examining Network and Internet Access Security (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Computer Concepts – Illustrated 8th Edition Figure F-20: Windows Firewall settings
Exploring Web and Email Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Computer Concepts – Illustrated 8th Edition Figure F-23: Anti-Spyware software
Exploring Web and Email Security (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Understanding Backups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Understanding Backups (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Talking Points: Prosecuting Computer Crime ,[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Talking Points: Prosecuting Computer Crime (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Concepts – Illustrated 8th Edition Computer Concepts – Illustrated 8th Edition

Más contenido relacionado

La actualidad más candente

La actualidad más candente (19)

Os security issues
Os security issuesOs security issues
Os security issues
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
 
O p
O pO p
O p
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Operating system security (a brief)
Operating system security (a brief)Operating system security (a brief)
Operating system security (a brief)
 
OSCh19
OSCh19OSCh19
OSCh19
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
Ch11
Ch11Ch11
Ch11
 
File000148
File000148File000148
File000148
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Protection
ProtectionProtection
Protection
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating system
 
OSCh18
OSCh18OSCh18
OSCh18
 
Computer Literacy Lesson 31
Computer Literacy Lesson 31Computer Literacy Lesson 31
Computer Literacy Lesson 31
 
Hardware security
Hardware securityHardware security
Hardware security
 

Destacado

Fast-Teks 20 ways to protect your computer
Fast-Teks 20 ways to protect your computer Fast-Teks 20 ways to protect your computer
Fast-Teks 20 ways to protect your computer santlou
 
Emerging Risk - Syed Anser Hussain Naqvi
Emerging Risk - Syed Anser Hussain NaqviEmerging Risk - Syed Anser Hussain Naqvi
Emerging Risk - Syed Anser Hussain NaqviProtagonistsoldier
 
Security and protection
Security and protectionSecurity and protection
Security and protectionNital Shingala
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemLee Ray
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!EMBplc.com
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Oles Seheda
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Destacado (13)

Fast-Teks 20 ways to protect your computer
Fast-Teks 20 ways to protect your computer Fast-Teks 20 ways to protect your computer
Fast-Teks 20 ways to protect your computer
 
Emerging Risk - Syed Anser Hussain Naqvi
Emerging Risk - Syed Anser Hussain NaqviEmerging Risk - Syed Anser Hussain Naqvi
Emerging Risk - Syed Anser Hussain Naqvi
 
Security and protection
Security and protectionSecurity and protection
Security and protection
 
Chapter 15 - Security
Chapter 15 - SecurityChapter 15 - Security
Chapter 15 - Security
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar a Unit F Data Security

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And PrivacyMISY
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptxKhristine Botin
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be rememberedwolverine0614
 
Module 5 security
Module 5   securityModule 5   security
Module 5 securityIT
 
Chapter11
Chapter11Chapter11
Chapter11Izaham
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and securitySomesh Kumar
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyYhal Htet Aung
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptRamaNingaiah
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIan Dave Balatbat
 

Similar a Unit F Data Security (20)

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Computer security
Computer securityComputer security
Computer security
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 
Chapter11
Chapter11Chapter11
Chapter11
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Computer security
Computer securityComputer security
Computer security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Computer security
Computer securityComputer security
Computer security
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 

Más de Chaffey College (20)

Strings Objects Variables
Strings Objects VariablesStrings Objects Variables
Strings Objects Variables
 
Ruby Chapter 2
Ruby Chapter 2Ruby Chapter 2
Ruby Chapter 2
 
Social networks and games
Social networks and gamesSocial networks and games
Social networks and games
 
Serious games
Serious gamesSerious games
Serious games
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
The games factory 2 alien wars
The games factory 2 alien warsThe games factory 2 alien wars
The games factory 2 alien wars
 
Target markets
Target marketsTarget markets
Target markets
 
Ch 8 introduction to data structures
Ch 8 introduction to data structuresCh 8 introduction to data structures
Ch 8 introduction to data structures
 
Ch 8 data structures in alice
Ch 8  data structures in aliceCh 8  data structures in alice
Ch 8 data structures in alice
 
Ch 7 recursion
Ch 7 recursionCh 7 recursion
Ch 7 recursion
 
Intro to gml
Intro to gmlIntro to gml
Intro to gml
 
Power point unit d
Power point unit dPower point unit d
Power point unit d
 
Power point unit c
Power point unit cPower point unit c
Power point unit c
 
Power point unit b
Power point unit bPower point unit b
Power point unit b
 
Power point unit a
Power point unit aPower point unit a
Power point unit a
 
Gamegraphics
GamegraphicsGamegraphics
Gamegraphics
 
Gamesound
GamesoundGamesound
Gamesound
 
Ch 6 text and sound in alice
Ch 6 text and sound in aliceCh 6 text and sound in alice
Ch 6 text and sound in alice
 

Unit F Data Security