Computer Security Presentation
Computer Security Presentation
COMPUTER
SYSTEMS
BY GROUP J
INTRODUCTION
Security in computer systems refers to safe guarding
hardware, software and data from damage , disruption
and unauthorized access from all possible sources of
security breaches.
These sources include:
• Current and former employees
• Cyber terrorists
• Hackers
• Computer viruses
The policies and protective measures that will be used, the
responsibilities of individuals who maintain security and those
that abide by established precautions forms a SECURITY
PROGRAM.
Related key terms include:
• Threat: This is a potential violation of security.
• Attacks: This is a vulnerability that has been
compromised and exploited to cause harm to a computer
system.
• Risk: Event or action that causes loss of or damage to a
computer system.
• Ethics: Moral principle concerning computer use.
COMPUTER SECURITY
Computer security refers to the protection of computer
systems and data from various threats, ensuring the safety of
assets against potential damages.
Importance:
• Ensures operational continuity, minimizes disruptions from
breaches.
• Protects sensitive information, hardware, software, and data
integrity.
Key Aspects:
• Physical Security: Protects hardware from theft, vandalism,
disasters.
Strategies for Enhanced
Security:
Secure Physical Access: Restrict access to authorized
personnel only.
Equipment Protection: Use locks to prevent theft of
hardware.
Environmental Controls: Maintain proper conditions to
t
prevent hardware damage.
Fire Suppression: Install systems to protect against fire-
related damage.
Uninterruptible Power Supply (UPS): Safeguard against
power issues for continuous operation.
Backup Power Sources: Ensure functionality during
prolonged outages.
Network
Network security is the protection of underlying
Security
network infrastructure from unauthorized
access, misuse or theft.
It involves implementing measures to protect
computer networks from unauthorized, access,
attacks and data breaches.
How does it
•
work?
Network security combines multiple layers of
defences in the network whereby each network
security layer implements policies and controls.
• Authorized users gain access to network resources
but malicious actors are blocked from carrying out
exploits
TYPES OF NETWORK SECURITY
Firewalls: Monitor incoming and outgoing network traffic and decide
whether to block or allow traffic based on a set of rules.
Intrusion detection System(IDS) and Intrusion Prevention System (IPS):
They scan network and detect and prevent security policy violations
respectively.
Virtual Private Networks(VPNs): They create a secure, encriped
connection over a less secure network, such as the internet.
Authentical and access Control:This involves strong password policies,
multifactor authentication and limiting access priviledges.
Encryption: Protects data by converting it to code to prevent
unauthorised access..
Security protocols: such as HTTPS and SSH that protect data during
transmission.
INFORMATION SECURITY
• Is the process by which an organization protects and
secures its systems, media, and facilities that process and
maintain information vital to its operations.
• It encompasses a range of measures and strategies designed
to ensure confidentiality, integrity and availability of
information in computing environments