Security measure
description
Transcript of Security measure
![Page 1: Security measure](https://reader031.fdocuments.net/reader031/viewer/2022020720/5483382cb4af9f730d8b49ae/html5/thumbnails/1.jpg)
NAME : AMIRAH AINA BINTI ZAINUDIN
I/C : 970923-10-6514MEMBER NAME : ANIS BASIRAH
NURUL ATHIRAH
SECURITY MEASURESAUTHENTICATION & BIOMETRICS
![Page 2: Security measure](https://reader031.fdocuments.net/reader031/viewer/2022020720/5483382cb4af9f730d8b49ae/html5/thumbnails/2.jpg)
SECURITY MEASURESecurity measures mean the precautionary measures taken toward possible danger or damage. There are 6 types of security measures :-1) DATA BACKUP
-Data Backup is a program of file duplication. Backups of data applications are necessary so that they can be recovered in case of an emergency.
2) CRYPTOGRAPHY-Cryptography is a process of hiding information by alteringthe actual information into different representation.
3) ANTIVIRUS-An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in the computer memory.
![Page 3: Security measure](https://reader031.fdocuments.net/reader031/viewer/2022020720/5483382cb4af9f730d8b49ae/html5/thumbnails/3.jpg)
4) ANTI-SPYWARE
-Spyware is a program placed on a computer without the user’s knowledge. It secretly collects information about the user.
5) FIREWALL
-Firewall is a piece of hardware or software which functions in a networked environment to prevent some communications forbidden by the security policy.
6) HUMAN ASPECTS OF SECURITY MEASURES
- Human aspects refer to the user and also the intruder of a computer system. It is one of the hardest aspects to give protection to.
![Page 4: Security measure](https://reader031.fdocuments.net/reader031/viewer/2022020720/5483382cb4af9f730d8b49ae/html5/thumbnails/4.jpg)
AUTHENTICATION-Authentication is a process where users verify that they are who they say they are.
TWO TYPE AUTHENTICATION :-
1) CALLBACK SYSTEM2) BIOMETRICS DEVICES
![Page 5: Security measure](https://reader031.fdocuments.net/reader031/viewer/2022020720/5483382cb4af9f730d8b49ae/html5/thumbnails/5.jpg)
CALLBACK SYSTEM-A callback system connects a user to a computer only after the computer calls the user back at a previously established telephone number.
To started the callback system :-
1)The user calls the computer and then enter the correct username and password.
2)The computer instructs the user to hang up and then calls the user back.
![Page 6: Security measure](https://reader031.fdocuments.net/reader031/viewer/2022020720/5483382cb4af9f730d8b49ae/html5/thumbnails/6.jpg)
BIOMETRICS DEVICES-Biometrics is the science and technology of measuring and analyzing biological data.
BIOMETRICS DEVICES :-
-FINGERPRINTS RECOGNITIONThey are also readily accessible and require little physical space either for the reading hardware or the stored data.
![Page 7: Security measure](https://reader031.fdocuments.net/reader031/viewer/2022020720/5483382cb4af9f730d8b49ae/html5/thumbnails/7.jpg)
-FACE RECOGNITIONUses distinctive facial features, including upper outlines of eye sockets, areas around cheekbones, the sides of the mouth and the location of the nose and eyes.
- VOICE RECOGNITION
The idea is to verify the individual speaker against a stored voice pattern, not tounderstand what is being said.
- SIGNATURE DYNAMIC
Based on an individual's signature, but considered unforgettable because what is recorded isn't the final image but how it is produced .
![Page 8: Security measure](https://reader031.fdocuments.net/reader031/viewer/2022020720/5483382cb4af9f730d8b49ae/html5/thumbnails/8.jpg)
CONCLUSION- Security Measures is very important to protect our computer data .
-Biometric technology is now being used in almost every area. Not only that, but various types of biometric systems are being used to achieve various functionalities.
![Page 9: Security measure](https://reader031.fdocuments.net/reader031/viewer/2022020720/5483382cb4af9f730d8b49ae/html5/thumbnails/9.jpg)
-http://myictdotnet.blogspot.com/2009/01/l18-security-measures.html
SOURCES OF REFERENCE
-http://www.wong-sir.com/cit/social_impacts/callback_system.htm
-http://myictdotnet.blogspot.com/search?updated-min=2008-01-01T00:00:00-08:00&updated-max=2009-01-01T00:00:00-08:00&max-results=10-http://www.computerworld.com/s/article/44257/Authentication