SlideShare une entreprise Scribd logo
1  sur  21
Physical Security and Digital
Security
MOHAMAD ZAWAWI BIN MAH HASAN
MUHAMMAD AZIZIE BIN MEZELAN
Physical security
Description
 Physical security, as the name implies,
involves protecting your assets and
information from physical access by
unauthorized personnel.
 In other words, you’re trying to protect
those items that can be seen, touched, and
stolen.
Physical security
 Lock Door – one of the easiest way to
prevent those intent to creating problems
physically entering your environment is to
lock your doors and keep them out.
 Securing physical
documents/password/shredding – in high
security and government environment,
sensitive papers should be either shredded
or burned.
Physical security
 Biometrics – physical characteristic to
identify the user.(fingerprint, palm, hand
scanner, retina scanner, and soon, possibly,
DNA scanner)
 Badges – can be any of form of
identification intended to differentiate the
holder from everyone else. Eg: name badge
or photo ID.
Physical security
 Key Fobs – are named after the chains that
used to hold pocket watches to clothes.
 RFID Badges – is a type of badge or card
that give you access to resources, including
buildings, parking lots and computer.
Physical security
 RSA token – are anything that user must
have on them to access network resources
and are often associated with devices that
enables the user to generate one-time
password authenticating their identity.
 Privacy Filters – either film or glass add-ons
that are placed over a monitor or laptop
screen to prevent the data on the screen
from being readable when viewed from the
sides.
Physical security
Physical security
 Retinal – one form of biometric device that
can be used to identify user.
– Matches are made based upon identification of
the blood vessel in an individual retina.
– Rather expensive.
 Tailgating – refers being so close to
someone when they enter a building that
you are able to come in right behind them
without needing use a key, a card, or any
other security device.
Digital Security
Description
Focused on keeping harmful data and
malware out as well as on
authorization and permissions.
Focused on:
• antivirus software
• Firewalls
• Antispyware
• User authentication/strong passwords
• Directory permissions
Why do we need Digital Security?
• Within our society, there
are people who are
dishonest and we
must take
precautions, just like
we do when we lock
our doors, to make
sure our digital
information and
equipment are
protected!
Digital Security
Anti-virus Software
 Operation:
 Run in the background at all time
 Update the virus definition to recognize new malicious
software
 Signature-based detection involves searching for known
patterns of data within executable code
 Generic-based signature are being used to detect new
virus by looking for malicious code/slight variants of code
in file and will be test in sandbox to see if it performs any
malicious actions.
Digital Security
Anti-virus Software
 Example:
 AVG
 Avira
 Avast
 Eset NOD32
 Panda
Digital Security
FIREWALL
• Device that provides secure connectivity between networks
(internal/external; varying levels of trust)
• Used to implement and enforce a security policy for
communication between networks
• Separate local network from the Internet
Trusted hosts and
networks Firewall
Router
Intranet
DMZ Demilitarized Zone:
publicly accessible
servers and networks
Digital Security
FUNCTIONS OF FIREWALL
Restrict incoming and outgoing traffic by IP
address, ports, or users
Block invalid packets
Digital Security
Antispyware
 Just as antivirus seeks out and stops viruses from
entering and spreading
 Purpose of antispyware software
 The OS from Microsoft are the one most affected
by spyware, and Microsoft has released
Windows Defender and Security Esentials
Digital Security
User authentication/strong passwords
A strong password is a password that meets the following guidelines:
- Be seven or fourteen characters long, due to the way in which encryption
works. For obvious reasons, fourteen characters are preferable.
- Contain both uppercase and lowercase letters.
- Contain numbers.
- Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # |  < , > . ?
/
- Contain a symbol in the second, third, fourth, fifth or sixth position (due to
the way in which encryption works).
- Not resemble any of your previous passwords.
- Not be your name, your friend's or family member's name, or your login.
- Not be a dictionary word or common name.
Digital Security
Directory permissions
 Can do to improve or change the security of the
directory services deployed.
 Can ensure that they don’t become a tool for
an attacker bent on compromising
organization’s security
Thank You

Contenu connexe

Tendances

Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Edureka!
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message SecurityNrapesh Shah
 
Data Security
Data SecurityData Security
Data SecurityAkNirojan
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Edureka!
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
Ethical hacking Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking   Chapter 5 - Physical Information Gathering - Eric VanderburgEthical hacking   Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking Chapter 5 - Physical Information Gathering - Eric VanderburgEric Vanderburg
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructureKerry Cole
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...Edureka!
 
Network security
Network securityNetwork security
Network securityfatimasaham
 

Tendances (20)

Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
 
Network security
Network securityNetwork security
Network security
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 
Data Security
Data SecurityData Security
Data Security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network security
Network securityNetwork security
Network security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking   Chapter 5 - Physical Information Gathering - Eric VanderburgEthical hacking   Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking Chapter 5 - Physical Information Gathering - Eric Vanderburg
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
1 security goals
1   security goals1   security goals
1 security goals
 
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network security
Network securityNetwork security
Network security
 

Similaire à Digital physical security[present]

Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryrryrsyd
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024Michael Noel
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security ChecklistMobeen Khan
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdfonline Marketing
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber securityJetking
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer SecurityKongChunLeong1
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 

Similaire à Digital physical security[present] (20)

Data security
Data securityData security
Data security
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
iTM ppt....pptx
iTM ppt....pptxiTM ppt....pptx
iTM ppt....pptx
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
 
Computer security and
Computer security andComputer security and
Computer security and
 
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Methods
MethodsMethods
Methods
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 

Dernier

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Dernier (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Digital physical security[present]

  • 1. Physical Security and Digital Security MOHAMAD ZAWAWI BIN MAH HASAN MUHAMMAD AZIZIE BIN MEZELAN
  • 3. Description  Physical security, as the name implies, involves protecting your assets and information from physical access by unauthorized personnel.  In other words, you’re trying to protect those items that can be seen, touched, and stolen.
  • 4. Physical security  Lock Door – one of the easiest way to prevent those intent to creating problems physically entering your environment is to lock your doors and keep them out.  Securing physical documents/password/shredding – in high security and government environment, sensitive papers should be either shredded or burned.
  • 5. Physical security  Biometrics – physical characteristic to identify the user.(fingerprint, palm, hand scanner, retina scanner, and soon, possibly, DNA scanner)  Badges – can be any of form of identification intended to differentiate the holder from everyone else. Eg: name badge or photo ID.
  • 6. Physical security  Key Fobs – are named after the chains that used to hold pocket watches to clothes.  RFID Badges – is a type of badge or card that give you access to resources, including buildings, parking lots and computer.
  • 7. Physical security  RSA token – are anything that user must have on them to access network resources and are often associated with devices that enables the user to generate one-time password authenticating their identity.  Privacy Filters – either film or glass add-ons that are placed over a monitor or laptop screen to prevent the data on the screen from being readable when viewed from the sides.
  • 8.
  • 10. Physical security  Retinal – one form of biometric device that can be used to identify user. – Matches are made based upon identification of the blood vessel in an individual retina. – Rather expensive.  Tailgating – refers being so close to someone when they enter a building that you are able to come in right behind them without needing use a key, a card, or any other security device.
  • 12. Description Focused on keeping harmful data and malware out as well as on authorization and permissions. Focused on: • antivirus software • Firewalls • Antispyware • User authentication/strong passwords • Directory permissions
  • 13. Why do we need Digital Security? • Within our society, there are people who are dishonest and we must take precautions, just like we do when we lock our doors, to make sure our digital information and equipment are protected!
  • 14. Digital Security Anti-virus Software  Operation:  Run in the background at all time  Update the virus definition to recognize new malicious software  Signature-based detection involves searching for known patterns of data within executable code  Generic-based signature are being used to detect new virus by looking for malicious code/slight variants of code in file and will be test in sandbox to see if it performs any malicious actions.
  • 15. Digital Security Anti-virus Software  Example:  AVG  Avira  Avast  Eset NOD32  Panda
  • 16. Digital Security FIREWALL • Device that provides secure connectivity between networks (internal/external; varying levels of trust) • Used to implement and enforce a security policy for communication between networks • Separate local network from the Internet Trusted hosts and networks Firewall Router Intranet DMZ Demilitarized Zone: publicly accessible servers and networks
  • 17. Digital Security FUNCTIONS OF FIREWALL Restrict incoming and outgoing traffic by IP address, ports, or users Block invalid packets
  • 18. Digital Security Antispyware  Just as antivirus seeks out and stops viruses from entering and spreading  Purpose of antispyware software  The OS from Microsoft are the one most affected by spyware, and Microsoft has released Windows Defender and Security Esentials
  • 19. Digital Security User authentication/strong passwords A strong password is a password that meets the following guidelines: - Be seven or fourteen characters long, due to the way in which encryption works. For obvious reasons, fourteen characters are preferable. - Contain both uppercase and lowercase letters. - Contain numbers. - Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # | < , > . ? / - Contain a symbol in the second, third, fourth, fifth or sixth position (due to the way in which encryption works). - Not resemble any of your previous passwords. - Not be your name, your friend's or family member's name, or your login. - Not be a dictionary word or common name.
  • 20. Digital Security Directory permissions  Can do to improve or change the security of the directory services deployed.  Can ensure that they don’t become a tool for an attacker bent on compromising organization’s security