Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
3 views

Computer Security Presentation

The document outlines the importance of security in computer systems, emphasizing the need to protect hardware, software, and data from various threats such as cyber attacks and unauthorized access. It details key aspects of computer security, including physical security, network security, and information security, while highlighting strategies for enhancing security measures. Additionally, it introduces the CIA model (Confidentiality, Integrity, Availability) as a guiding framework for establishing effective information security policies.

Uploaded by

ann karagwa
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Computer Security Presentation

The document outlines the importance of security in computer systems, emphasizing the need to protect hardware, software, and data from various threats such as cyber attacks and unauthorized access. It details key aspects of computer security, including physical security, network security, and information security, while highlighting strategies for enhancing security measures. Additionally, it introduces the CIA model (Confidentiality, Integrity, Availability) as a guiding framework for establishing effective information security policies.

Uploaded by

ann karagwa
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

SECURITY IN

COMPUTER
SYSTEMS
BY GROUP J
INTRODUCTION
Security in computer systems refers to safe guarding
hardware, software and data from damage , disruption
and unauthorized access from all possible sources of
security breaches.
These sources include:
• Current and former employees
• Cyber terrorists
• Hackers
• Computer viruses
The policies and protective measures that will be used, the
responsibilities of individuals who maintain security and those
that abide by established precautions forms a SECURITY
PROGRAM.
Related key terms include:
• Threat: This is a potential violation of security.
• Attacks: This is a vulnerability that has been
compromised and exploited to cause harm to a computer
system.
• Risk: Event or action that causes loss of or damage to a
computer system.
• Ethics: Moral principle concerning computer use.
COMPUTER SECURITY
Computer security refers to the protection of computer
systems and data from various threats, ensuring the safety of
assets against potential damages.

Importance:
• Ensures operational continuity, minimizes disruptions from
breaches.
• Protects sensitive information, hardware, software, and data
integrity.

Key Aspects:
• Physical Security: Protects hardware from theft, vandalism,
disasters.
Strategies for Enhanced
Security:
Secure Physical Access: Restrict access to authorized
personnel only.
Equipment Protection: Use locks to prevent theft of
hardware.
Environmental Controls: Maintain proper conditions to
t
prevent hardware damage.
Fire Suppression: Install systems to protect against fire-
related damage.
Uninterruptible Power Supply (UPS): Safeguard against
power issues for continuous operation.
Backup Power Sources: Ensure functionality during
prolonged outages.
Network
Network security is the protection of underlying

Security
network infrastructure from unauthorized
access, misuse or theft.
It involves implementing measures to protect
computer networks from unauthorized, access,
attacks and data breaches.

How does it

work?
Network security combines multiple layers of
defences in the network whereby each network
security layer implements policies and controls.
• Authorized users gain access to network resources
but malicious actors are blocked from carrying out
exploits
TYPES OF NETWORK SECURITY
Firewalls: Monitor incoming and outgoing network traffic and decide
whether to block or allow traffic based on a set of rules.
Intrusion detection System(IDS) and Intrusion Prevention System (IPS):
They scan network and detect and prevent security policy violations
respectively.
Virtual Private Networks(VPNs): They create a secure, encriped
connection over a less secure network, such as the internet.
Authentical and access Control:This involves strong password policies,
multifactor authentication and limiting access priviledges.
Encryption: Protects data by converting it to code to prevent
unauthorised access..
Security protocols: such as HTTPS and SSH that protect data during
transmission.
INFORMATION SECURITY
• Is the process by which an organization protects and
secures its systems, media, and facilities that process and
maintain information vital to its operations.
• It encompasses a range of measures and strategies designed
to ensure confidentiality, integrity and availability of
information in computing environments

CORE OBJECTIVES OF INFORMATION SECURITY


Confidentiality: Ensures that information is only accessed by
authorized individuals thereby protecting data from unauthorized
disclosure.
Integrity: Ensuring the accuracy and reliability of information and
involves preventing unauthorized modification
Availability: Ensuring information is available and accessible when
needed. This involves protecting against disruptions, outages or
Other Information Security
Objectives
Authentication: This involves verifying the identity of the users,
systems or entities.
Authorization: Granting appropriate access permissions to users
or systems.
Non-Repudiation: Ensuring that thee origin of the information
cannot be denied by the sender or recipient.
Security policies and procedures: Establishing and implementing
policies to govern information security practices.
Encryption: It involves making data unreadable using
cryptographic techniques.
In conclusion, security is crucial when it comes to design,
development and operation of computer systems and networks.
CIA security CIA in full
this is a model designed guide it stands for
policies for information security 1.confidentiality;is a set of
with in an organization.
rules that limits access of
information.
2.integrity;is the assuarance
that the information is
trustworthy and accurate.
3.Availability; is a guarantee
of reliable access to the
information by authorized
people.
EXAMPLES CHALLENGE
S
• By requiring an account • insider threats due to the
number when banking online. employees or other trusted
• one can also store an air- individuals who misuse their
gapped computers or access to sensitive
disconnected devices. information.
• digital signatures can also be • cybercriminals also use
used to provide efficiency. psychological manipulation to
• a backup copy that is stored in deceive users into revealing
cinfidential information or
the geographically isolated
performing actions to
location
compromise security
• extra security equipments or
software such as firewalls and
proxy servers can guard

You might also like