0% found this document useful (0 votes)
11 views

Topic 2_Methods to Secure Data

Topic 2_Methods to Secure Data

Uploaded by

razhta9
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Topic 2_Methods to Secure Data

Topic 2_Methods to Secure Data

Uploaded by

razhta9
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Unit 3: OPERATING

ONLINE
___________

Teacher:
Kikambi John Bosco

OPERATING ONLINE 1
2: Methods
available to secure
data and personal
information online

OPERATING ONLINE 2
Objective 2: Know about methods available to
secure data and personal information online:
 Turn on Firewalls
 Data Encryption
 Use passwords, PIN and Biometrics
 Use CAPTCHA tests and security questions
 Use anti-malware, anti-virus, antiadware and
anti-spyware
 Set access rights and file permissions
 Secure websites
 Do not open email attachments or following web
links.
 Use backup procedures
OPERATING ONLINE 3
METHODS TO SECURE DATA AND PERSONAL
INFORMATION ONLINE
• Much of the data transmitted online is sensitive and
valuable, and it is important to protect that data from
unauthorized access. There are several different methods
used to secure data and personal information. These include
 Turn on Firewalls
 Data Encryption
 Use passwords, PIN and Biometrics
 Use CAPTCHA tests and security questions
 Use anti-malware (anti-virus, anti-adware and anti-spyware)
 Set access rights and file permissions
 Secure websites
 Do not open email attachments or following web links.
 Use backup procedures
OPERATING ONLINE 4
METHODS TO SECURE DATA AND PERSONAL INFORMATION ONLINE

• TURN ON FIREWALLS: a firewall is a network security


system that monitors and controls incoming and outgoing
network traffic based on predetermined security rules.
• The primary use of a firewall in networking is to secure
the network from cyberattacks.

There are two types of firewalls based on what they


protect: network-based and host-based.
• Network-based firewalls are frequently hardware,
protect entire networks.
• Host-based firewalls: are frequently software,
protect individual devices known as hosts.
OPERATING ONLINE 5
• DATA ENCRYPTION: Encryption is the process
of converting data from a readable format to
unreadable format. Encryption is used to
protect data from being stolen or changed.

• USE PASSWORDS, PINS AND BIOMETRICS:


Passwords, PINs and biometrics are used online
to authenticate a user so that they can access
an online system, such as webmail or an online
bank account.

OPERATING ONLINE 6
How to Create a Strong
Password
 A password should be more than eight
characters long.
 A password should be a mix of letters,
numbers and symbols.
 Should be a mix of uppercase and
lowercase letters.
 Made up of random characters (that is,
not common words, names or dates)
 Should be changed frequently
 Should be something that they have not
used before.
OPERATING ONLINE 7
• USE CAPTCHA TESTS AND SECURITY QUESTIONS:
When users create an online account, they may be given a
test called a CAPTCHA test. CAPTCHA tests are used to
make sure that data is entered by a human and not by an
automatic software program known as a bot or web robot.

• CAPTCHA stands for Completely Automated Public


Turing Test To Tell Computers and Humans
Apart.
• Some CAPTCHA tests work by asking users to enter a
randomly generated series of letters and numbers that are
displayed on the screen.
OPERATING ONLINE 8
Features of CAPTCHA
Tests
 Image identification.

 CAPTCHA tests can play audio for


users who cannot read the text
 CAPTCHA tests can ask users to
complete more challenging tasks

OPERATING ONLINE 9
CAPTCHA TESTS

• Image identification CAPTCHA tests are


another way of checking that users are
human

• CAPTCHA tests can play


audio versions for users
who cannot read the text

• CAPTCHA tests can ask


users to complete more
challenging tasks
OPERATING ONLINE 10
• NB: reCAPTCHA tests work in the same way as CAPTCHA
tests, but they use extracts of text from scanned books or a
selection of images that share common features.

• Computers read as “niis” Scanned type aged pntkm at


society were distinguished frow.”

• Computers find it difficult to interpret scanned text from


books but humans can read the text much more easily, which
means that using humans to interpret scanned text produces
more accurate outcomes
OPERATING ONLINE 11
• USE ANTI-MALWARE: Anti-malware prevents
malware from accessing or operating on
computers. It scans computer files in real-time
and allows users to scan files, folders, disks or
whole systems.

OPERATING ONLINE 12
Anti-malware

• Anti-malware include;-

• Anti-virus

• Anti-adware

• Anti-spyware

OPERATING ONLINE 13
• ANTI-VIRUS: A virus is malware that uses networks to
spread to connected devices. Viruses are spread via
communication software such as email or web browsers or
by being loaded into a computer’s memory from external
storage such as USB flash drives. Viruses often look like
normal files.
• Anti-virus software constantly checks files that are
downloaded and loaded by a computer for signs of virus
definitions. If the anti-virus software finds a match, it
quarantines the file so that it cannot be run.
• Anti-virus software has to be updated regularly
because virus code can be changed, either automatically
or by the developers of the virus.
A virus checker can
quarantine an infected file
so that it cannot infect
other files
OPERATING ONLINE 14
• ANTI-ADWARE: Adware displays unwanted

adverts to users. Anti-adware software detects,

quarantines and removes adware.

• ANTI-SPYWARE: Spyware secretly monitors and

records computer data and user input. For

example, a keylogger is a type of spyware that

monitors and records actions such as key presses

or mouse movements. Anti-spyware software

detects, quarantines and removes spyware.


OPERATING ONLINE 15
Objectives
17/09/2023

• To understand how to protect


yourself from malware.
• Knowing the types of backup and
the Good ideas for backup
procedures.

OPERATING ONLINE 16
How to protect yourself
from malware?
 Install antivirus or anti-malware
software.
 Keep your antivirus software up
to date.
 Run antivirus scans regularly.
 Keep your operating system up to
date.
 Protect your network.
 Think before you click.
OPERATING ONLINE 17
• SET ACCESS RIGHTS AND FILE PERMISSION: this can be set
to files, folders, allowing users to read only or read and write to
the file. Permission are the settings that provide the ability for a
user to access files, folders or drives.

• SECURE WEBSITES: HTTPS keeps communications private and


provides security for users’ online accounts.

• EMAIL ATTACHMENTS AND WEB LINKS: Users should always


be careful when opening email attachments or hyperlinks in
emails and other messages. This is because some are fake and
designed to steal users’ personal information.

• Users should ensure that their anti-malware software is up to


date. OPERATING ONLINE 18
• BACKUP PROCEDURES: Backup is the process of

creating one or more copies of data files or folders.

• A backup is usually stored to an external storage

device. This makes the data more secure, because the

backup files will be safe even if the original storage

device fails or is damaged, lost or stolen.

• Backups can also be saved to online storage. This

means that a copy of the data is held in two different

geographical locations.

• Backing up to online storage can be slower because

the process
OPERATING ONLINE
uses an internet connection. 19
Types of backup
• Full backup: its creates a copy of
all files
• Differential backups: creates a
copy of all files that have changed
since the last full backup.
• Incremental backup: save a copy
of only the files that have changed
since the last full backup and
incremental backup.
OPERATING ONLINE 20
Good ideas for backup procedures

 Set automatic backups.


 Do not use optical media because they
weaken over time and are delicate.
 Schedule backups for late in the evening when
users are not using the data.
 Create more than one copy.
 Keep one copy of a folder containing important
files backed up using online storage.
 Store copies at multiple locations.
 Store important data in a fireproof safe.
OPERATING ONLINE 21
Terms
• Real time: processing data within milliseconds of it being input
and making the output available almost immediately

• Virus: malware that uses networks to spread to connected


devices.

• Virus definitions: sequences of code that are found in


computer viruses

• Quarantine: isolate a suspected virus in a protected area of


storage where it cannot harm other files

• adware software that displays unwanted adverts

• spyware software that monitors and records data

and user input


OPERATING ONLINE 22

You might also like