3. • The protection of
computer based resources
against unauthorized use or
natural disaster is known
as Security.
4. It defines the rights of the
individual users or organizations to keep their
personal data and information
Most of the damages
of data is caused by errors and
omissions. An organization always
needs accurate data for
transaction processing, providing
better service and making
5. A dishonest
programmer can easily any
software or data, if proper control
measures are not provided to the
system.
When the computer
resources can be misused
for unauthorized or illegal
function.
Fire and natural disaster like
floods , storms, snow-storms ,
lightning etc…
7. The special routines of a program .it
check whether the program is
performing correctly or not. It
do not have regular control
mechanisms and passwords. It is
use only when the normal
functioning of the software is
disturbed or stopped .
8. The special routines that
causes excessive damage
to the data or vital
program.
To get into someone
else’s computer system
without permission in
order to find out
information or do
10. Monitoring of data
transmissions which are
meant for other persons.
refers to setting up a special
transmission path for
diverting the flow of data.
14. The access to various
computer resources by
authorized users must be
properly controlled.Examination of the
system (Application software) where
the program are working or not.
16.
• Security is critical for
maintaining the integrity of data
stored on the network servers.
Login and Password Security
Account Security
Access Right
Information about group to which the
user belongs.
17. The contingency measures
that an organization must
take to recover the data in
case it is damaged.
It is the most
efficient method of disaster
recovery. It is a duplicate copies
of important data and software.
Standards of moral
conduct to be followed by
employees for using various