1 / 15

UNIT 19

UNIT 19. Data Security 2. Introduction. AGENDA. Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage techniques on networks. Hardware and Software protection.

aida
Télécharger la présentation

UNIT 19

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. UNIT 19 Data Security 2

  2. Introduction

  3. AGENDA • Hardware and Software protect ion • Network protect ion • Some authentication technologies :smart card • Storage techniques on networks

  4. Hardware and Software protection • There are a variety of security measures that can be used to protect hardware and software including: • Controlling the physical access to hardware and software. • Backing up data and programs: storing a copy of files on a storage device to keep them safe. • Implementing network controls such as: • Using passwords (a secret code used to control access to a network system).

  5. Hardware and Software protection (and Network protection) • Installing a firewall (a combination of hardware and software used to control the data going into and out of a network. It is used to prevent unauthorized access to the network by hackers). • Encrypting data (protecting data by putting it in a form only authorized users can understand).

  6. Hardware and Software protection (and Network protection) • Installing a callback system ( a system that automatically disconnects a telephone line after receiving a call and then dials the telephone number of the system that made the call, to reconnect the line. It is used in remote access systems to make sure that connections can only be made from permitted telephone numbers). • Using signature verification or biometric security devices.

  7. Hardware and Software protection (and Network protection) • Separating and rotating the computing functions carried out by employees and carrying out periodic audits of the system (observing and recording events on the network systematically).

  8. Hardware and Software protection • Protecting against natural disasters by installing uninterruptible power supplies and surge protectors. Electronic devices that protect equipment from damage due to a sudden surge in a power supply battery backup systems that automatically provide power to a computer when the normal electricity source fails.

  9. Hardware and Software protection • Protecting against viruses by using anti virus programs and ensuring that all software is free of viruses before it is installed. • Particular care should be taken when using public domain software (freeware) and shareware. • An anti-virus program is a program that checks files for virus coding instructions inside another program and can be used for removing any virus coding instructions detected. computer programs or sets of programs used to detect, identify and remove viruses from a computer system

  10. Some authentication technologies (smart card) • A smart card is a plastic card containing a processor and a memory chip. It can be used to store large amounts of confidential data including coded data that can be used as digital cash. Electronic currency that is used for making electronic purchases over the Internet

  11. Some authentication technologies (smart card) • It can also be used as a security device to prevent or allow access to a system and allow the user to withdraw cash from a bank ATM. Automatic Teller Machine- a type of machine used by banks for enabling customers to withdraw money from their bank accounts.

  12. Some authentication technologies (smart card) • A smart card reader is a device used for reading smart cards by detecting radio signals emitted from a radio antenna in the form of a small coil inside the smart card.

  13. Storage techniques on networks • Data is commonly stored on a LAN (Local Area Network) by attaching storage devices to a server. • Common storage devices include tape drives, RAID and optical devices such as CD-Roms. A computer that provides a network service A set of hard disks that work as one unit

  14. Storage techniques on networks • In large networks, server farms are used. The storage devices are often attached using a connection standard known as SCSI (Small Computer Systems Interface) • LANs with larger storage needs can add NAS (Networked Attached Storage) devices. They attach to the LAN and are available to all systems on the LAN without needing to be attached to a server computer. Large collections of networked server computers that work together by sharing the service workload

  15. Storage techniques on networks • The biggest network systems can also use a SAN (Storage Area Network). This is a storage network that uses high speed copper or fiber optic connections such as Fiber Channel (a high speed interconnection standard). • The SAN is a separate network that is interconnected to the main LAN. It is therefore available to all LAN users and can be centrally managed.

More Related