0% found this document useful (0 votes)
34 views32 pages

Data Security

Uploaded by

mohidchishty6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views32 pages

Data Security

Uploaded by

mohidchishty6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

Introduction to ICT

• Computer Crime
• Data security
• Security threats
• Computer virus
• Worms
• Personal computer security
• Backup of data
• Antivirus
• Data Protection Legislation
• Data Protection in Pakistan
• Intellectual Property
Computer Crime
• A type of crime in which a computer is either
the target or the tool for an illegal activity is
called computer crime.
• A type of crime that refers to an illegal act
involving the internet is called cyber crime.
• It usually involves stealing, using or selling
someone else’s data.
Computer Crime: Computer Criminals
• Computer criminals are the persons who
commit computer crimes.
• Different type of computer criminals are
– Hacker
– Script Kiddie
– Corporate Spy
– Unethical Employee
– Cyber Extortionist
– Cyber Terrorist
Security
• Security is a system that is used to protect a
computer system and data.
• It protects from intentional or accidental
damage or access by unauthorized persons.
• With the help of a security system, a computer
can detect whether the user is authorized or
not.
Data Security
• Protection of data is called data security.
• Data stored in computer can be lost
accidentally or someone can damage it can be
lost completely or partially.
• Data is more valuable and important than
computer itself, so it should be saved in such a
way that it may not be lost or damaged.
• It is very important to protect data from illegal
and unauthorized access.
Security Threats
• Computer security threat can be a computer
program or a person that violates computer
security.
• It may cause stealing or loss of data.
• It may also affect working of computer
Security Threats
• Hacker:
– A person who accesses a computer, network and its
resources illegally is known as hacker.
– Hackers are computer experts and user their
computer knowledge for negative purpose.
– Hackers may steal
• Information of clients or customers.
• Credit card details
• Passwords to access computers illegally
• Email passwords to use email account without user’s
knowledge
Security Threats
• Hardware Theft and Vandalism:
– Hardware theft is a process of stealing the
hardware equipment such as hard disk or monitor.
– Hardware vandalism is the process of defacing the
hardware equipment, e.g. an employee in an
organization may damage the keyboard and cut
the wires etc.
Security Threats
• Software Theft:
– Software theft means that a person can steal
software media, erase software program or copy it
without permission
• Information Theft:
– Information theft is a process of stealing personal
or confidential information.
– The stolen information can further be used for
illegal activities e.g. stealing credit card details and
use it for online shopping.
Security Threats
• System failure:
– System failure is an important security threat and
it occurs when the system does not function
properly for longer time.
– System failure may further cause loss of data,
software and hardware.
– It occurs due to various reasons
• Obsolete hardware
• Natural disaster such as flood, fire or storm
• Fluctuation in power supply
Computer Virus
• A computer virus is a program that may
disturb the normal working of a computer
system.
• Virus attaches itself to files stored in flash
drives, email attachments and hard disk.
• A file containing a virus is called an infected
file and when it is copied to a computer, virus
is also copied to the computer.
Computer Virus
• Computer viruses can not damage hardware
but they can cause many damages to
computer system.
• A computer virus can
– Damage data or software
– Delete some or all of the files
– Destroy all data by formatting hard disk
– Display a false message every few times.
Computer Virus: Causes
• A virus is spread on different computers due
to following reasons
– Infected flash drives or disks
– Email attachments
– Insecure websites
– Networks
– Pirated software
Computer Virus: Protection
• A computer system can b protected from
viruses by following these precautions
– Install latest anti-virus
– Upgrade antivirus regularly
– Scan flash drive before use
– Do not open junk or unknown emails
– Do not install pirated software
– Freeware and shareware software normally contain
viruses, so check the software before using it.
Worms
• A worm is a program that copies itself
repeatedly in memory or disk until no space is
left there and computer may stop working in
this situation.
• Worms spreads from one computer to
another computer through networks.
• Some examples of worms are SQL Slammer,
The Blaster Worm, One-Half and cascade.
Personal Computer security
• Avoid extreme conditions: The computer
system should not be placed in extreme
conditions, it should be safe from direct sun,
rain and extreme temperature.
• Avoid virus: Antivirus software must be
installed on the computer and must be
updated regularly.
Personal Computer security
• Firewall:
– A firewall is a set combination of hardware and
software that prevents unauthorized access to a
network.
– It works between an organization’s internal
network and the internet.
– It protects data, information and storage media
from unauthorized access.
– It can also be used to stop internal users from
accessing certain sites.
Personal Computer security
• Passwords:
– Password is a secret word that is used to protect a
computer system or program.
– The user has to type the password to access the
computer system, therefore the system can be
accessed only by the person who knows the
password.
– So the computer and the data stored on it will be
safe and protected.
Personal Computer security
• Encryption:
– Encryption is a process of encoding data so that only
authorized user may understand and use it.
– Some strong encryption should be used to protect
important files.
• Backup:
– An additional copy of data or information stored on
secondary storage media is called backup.
– It is very important to take backup of data regularly
and store it at a safe and protected place.
Backup of Data
• An additional copy of data or information
stored on secondary storage media is called
the backup of data.
• The common media for backup are USB flash
drives, magnetic tape, CD and external hard
disk.
Backup of Data: Purpose
• An important file can be deleted accidentally.
• The user may overwrite a part or whole of an
existing file.
• A mechanical failure in the computer may
result in loss of data.
• A virus may damage the data.
• The computer system may be damaged due to
fire or power failure.
Backup of Data: Types
• Two ways to take the backup of data are
– Complete backup
– Incremental backup
• Complete backup is the backup of all data on
the hard disk.
• Advantage of this backup is that entire hard
disk is backed-up and whole data can be
restored.
• It takes more time and storage capacity.
Backup of Data: Types
• Incremental backup creates a copy of only the
data that is newly created or modified since
the last backup.
• This process is performed automatically in
some software.
• In this type, entire disk is not copied so it takes
less time and space.
Antivirus
• Antivirus software is used to detect and remove
viruses, worms and adware etc.
• It contains information about different known
viruses.
• It runs in the background all the time and alerts
the computer user when any virus is detected.
• Some examples are McAfee, AVG, Kaspersky
and NOD32.
Antivirus: McAfee
• McAfee is an American organization that has
developed an antivirus program called McAfee
VirusScan.
• McAfee
– Automatically detects and removes viruses
– Block adware before it installs on computer
– Remove existing adware
– Protects computer from hackers
– Can also check emails for viruses.
Antivirus: AVG
• AVG stands for Antivirus Guard and is an
antivirus program developed by AVG
Technologies.
• It protects computer from latest viruses,
worms and other threats.
• The AVG Free Edition is also available that can
be downloaded, however it does not provide
full protection.
Antivirus
• The antivirus software should be managed
properly to detect and remove viruses, worms
and adware from the computer system.
• Many new viruses are created and spread
continuously.
• The antivirus software must be updated
regularly in order to protect the computer
properly.
Data Protection in Pakistan

“PERSONAL DATA PROTECTION BILL


2018”
Intellectual Property
• Intellectual property is the unique and original
works such as ideas, inventions, writings and logos
etc.
• Intellectual property rights are such rights which
are given to persons who are the authors or
creators of the new and original literary and artistic
works such as books, articles , other
writings ,paintings , musical compositions,
sculpture , films and computer programs by
application of their creativity process and intellect.
Intellectual Property
• Intellectual property rights are given to such
individuals to compensate for their efforts
during such creative process and their
investments.
• These rights are given for a certain period of
time and after which general public have the
right to freely benefit from them in their
benefit and use.
Intellectual Property
• The term intellectual property, covers the following
aspects in the relevant categories namely:
– Copyright: literary, artistic and scientific works
covering books, journals, magazines, written
articles etc.
– Trademarks: trademarks, merchandise marks,
service marks, commercial names and
designations like logos.
Intellectual Property
– Patents: inventions like a new form of airplane
engine, a floor cleaner, etc.
– Designs: it includes the shape of a bottle,
machine, model of luxury car or any other
product, etc.

You might also like