How to do Computer Security and Protection in Modern World.pptx

MarkAnthonyZamora4 1 views 20 slides Oct 02, 2025
Slide 1
Slide 1 of 20
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20

About This Presentation

Computer Secuirty


Slide Content

Computer Security and Protection By. Professor Mark Anthony M. Zamora

Computer security , also known as  cybersecurity  or  IT security , is security applied to computers, computer networks, and the  data stored and transmitted over them. The field is of growing importance due to the increasing reliance of computer systems in most societies. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things, and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks. Computer security covers all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction and the process of applying security measures to ensure confidentiality, integrity, and availability of data both in transit and at rest.

Types of Computer Security 1.Internet and Network Security 2.Standalone Computer Security 3.Data Loss by Accidents

1. Internet Security, among different types of computer security, covers malware and hacking techniques. The Internet is an open zone where anyone can create a website that may place malware on your computer or server. This is also the space that gives shelter to people who are on the prowl to reach your computer or servers to access your data for misuse . Example of Internet Security Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software . Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats.

Types of Computer Security - Other Major Issues in Network Security Among other types of computer security problems, this section deals with client-server model of networks. Any network is only as secure as the network designers and administrators make it. There are numerous ways whereby a network is vulnerable to both external and internal threats. Example of Network Security Firewall In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules . A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed to not be secure or trusted.

Types of Computer Security - Safety Factors Concerning Standalone Computers Among the major types of computer security are factors affecting data on standalone computers. The major threat is stealthy techniques used when such computers are left running and unattended. Many users do not consider locking their computers before taking a short break. Others can easily take a peek into the computer by the time the actual user returns. Hence it is recommended to program the computer to lock by itself after a few minutes of inactivity. The option is available in Windows OS where you can set a password for each user and set the properties to ask for the password when the screen saver is removed. This also calls for lowering the time before screen saver starts. Still, users should make it a habit to lock their computers as part of their data security policy .

Example of Standalone Computer Security Password A  password  is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which should be kept  secret  from those not allowed access. Tips for creating a strong password Passwords provide the first line of defense against unauthorized access to your computer. The stronger your password, the more protected your computer will be from hackers and malicious software. You should make sure you have strong passwords for all accounts on your computer. If you're using a corporate network, your network administrator might require you to use a strong password.

What makes a password strong (or weak)? A strong password: Is at least eight characters long. Does not contain your user name, real name, or company name. Does not contain a complete word. Is significantly different from previous passwords. Contains characters from each of the following four categories:

Character category Examples Uppercase letters A, B, C Lowercase letters a, b, c Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Symbols found on the keyboard (all keyboard characters not defined as letters or numerals) and spaces ` ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] \ | : ; " ' < > , . ? /

A password might meet all the criteria above and still be a weak password. For example,  Hello2U!  meets all the criteria for a strong password listed above, but is still weak because it contains a complete word.  H3ll0 2 U!  is a stronger alternative because it replaces some of the letters in the complete word with numbers and also includes spaces. Help yourself remember your strong password by following these tips: Create an acronym from an easy-to-remember piece of information. For example, pick a phrase that is meaningful to you, such as  My son's birthday is 12 December, 2004 . Using that phrase as your guide, you might use  Msbi12/Dec,4  for your password. Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase. For example,  My son's birthday is 12 December, 2004  could become  Mi$un's Brthd8iz 12124  (it's OK to use spaces in your password). Relate your password to a favorite hobby or sport. For example,  I love to play badminton  could become ILuv2PlayB@dm1nt()n . If you feel you must write down your password in order to remember it, make sure you don't label it as your password, and keep it in a safe place.

Encryption  is the most effective way to achieve data security. To read an  encrypted  file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text encrypted  data is referred to as cipher text.

Types of Computer Security - Data Loss by Accidents A network failure or a HDD crash is never predictable. One of the most important angles in types of computer security is loss of data caused by problems with data storage devices and data loss during transmission. For standalone computers, users can apply backup to external devices and/or to some online storage. Example of Data Loss by Accident Back Up In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup.

Backups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users. A 2008 survey found that 66% of respondents had lost files on their home PC. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required.

Thing you need to know in Computer Security 1. Use Antivirus

2. Leave UAC (User Account Control) Enabled

3. Leave the Firewall Enabled and Configure It Correctly

4. Keep Your Software Updated — Automatically if Possible

5. Be Careful About Programs You Download and Run

6. Don’t Reuse Passwords

Thank You….. Good Day……
Tags