0% found this document useful (0 votes)
581 views12 pages

Data Security Presentation

This document discusses computer security and data security. It defines computer security as protecting hardware, software, and data from accidental and deliberate damage, theft, and corruption. Data security specifically focuses on protecting data integrity and preventing unauthorized access. Threats can come from either accidental or deliberate internal and external sources.

Uploaded by

Zae Zay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
581 views12 pages

Data Security Presentation

This document discusses computer security and data security. It defines computer security as protecting hardware, software, and data from accidental and deliberate damage, theft, and corruption. Data security specifically focuses on protecting data integrity and preventing unauthorized access. Threats can come from either accidental or deliberate internal and external sources.

Uploaded by

Zae Zay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

COMPUTER SECURITY

WHAT IS COMPUTER SECURITY?

 Protecting hardware
 Protecting software
 Protection against accidental damage
 Protection against deliberate damage
 Protection against theft
 Protection against corruption
WHAT IS DATA SECURITY?

 Protection of data against deliberate damage

 Protection of data against accidental damage

 Protecting data against unauthorized access


WHAT IS

?
DATA INTEGRITY

Data integrity concerns the consistency,


accuracy, and reliability of data.
DELIBERATE
ACCIDENTAL
 Electrical power surges and  Physical theft of hardware

spikes and software by break-ins

 Natural disasters  Terrorist activities

 Industrial espionage

 Hackers

EXTERNAL SOURCES
ACCIDENTAL DELIBERATE

 E-mail attachments containing  Employee fraud


viruses
 Disgruntled employee
 Internally produced software
carrying a grudge
 Files accidentally erased or

corrupted

 Clerical errors

INTERNAL SOURCES
PLACE THE FOLLOWING UNDER THE CATEGORIES OUTLINED BY
TEACHER.

You might also like