Submitted By:: Brijesh Patel Roll No 19
Submitted By:: Brijesh Patel Roll No 19
Submitted By:: Brijesh Patel Roll No 19
Submitted By:
Brijesh Patel
Roll No 19
Security?
RISK TO IS :
Computer crime
Hacking
Continue
Risk to hardware
Natural Disaster
Firewalls
E-Mail Monitoring
Internet and other online e-mail systems are one of the favorite
avenues of attack by hackers for spreading computer viruses or
breaking into networked computers.
continue
2. Authentication
1) password or PIN.
3)Backup Files
Backup files, which are duplicate files of data or
programs, are another important security measure.