2. Either way, organisations cannot
function without accurate information,
and they do not want unauthorized people
getting into the system and changing
information .
In addition, much of this data is used in
the organisations decision making and
problem solving .
3. Organizations need to secure not only
their data but also the systems on which the
data is stored.
They need protection from natural
disasters acts of sabotage, theft and
unlawful access.
5. Organisations generally protect their
hardware and software by restricting access
to the areas in which the computer itself.
This is sometimes done by means of doors
that cannot be opened without a PIN, this
number being known only by certain people.
6. Encryptio
n
Is the transforming of normal text,
which can be read by all, into
something that requires a code or
decryption key.
7. Symmetric encryption
Is the traditional encryption method
and relies on both the sender and the
receiver of a message knowing the
key.
How ever, if a key is used by two
people who are considerable distance
apart, then at some stage the key must
be transmitted to the receiver.
8. Asymmetric or public key
encryption of encryption uses different
This kind
keys to encrypt and decrypt.
This system gives all users a public
key that all know and can use and a
private key that is secret.
A message is encrypted using the
public key and the private key is used
to decrypt the message.
At no point is the private key
9. PASSWORD
Most organization use a password
system that requires a user to enter
a name and password to log on the
system.
This system of identification and
access control is also adopted in
networks giving each user different
privileges.
Passwords can also be used on
10. ACCESS CARDS
By using swipe cards and
proximity cards, employees can
gain access to buildings and
specialized areas, depending on
the privileges allowed by that
card.
11. ACTIVE BADGES
Active badges restrict access by
tracking an employee’s location
using their badge.
Employees and their whereabouts
can be monitored by a central
system that knows where they are
at any given time.
12. FIREWALLS
Are type of software designed to
protect files and data from
unauthorized, external access of a
network through the internet.
Firewalls have a range of features,
including access control through
passwords and encryption, and a log
that records all unauthorized access
13. BIOMETRICS
Refers to the automatic identification
of a person based on a certain
physiological or behavioral
characteristics.
This method is growing in popularity
over the above methods because the
person to be identified is required to
be physically present at the point of
14.
15. By replacing PIN’s and passwords with
biometrics techniques, the risk of
unauthorized access and fraudulent use
is decreased.
Biometric identification can be applied
to a range of technology, such as
ATM’s’ mobile phone phones, smart
cards and desktop computers.
17. 1.A mechanism to scan and capture an
image of the characteristics
2. compression, processing and
comparison of the image
3. an interface with application system
19. voice- matches the sound patterns of
someone speaking their name or
passwords to those file.
facial identification- converts a facial
image on video to a digital one and
compares it with one on file.
fingerprints- compares the ridges on
fingers with those in a central database.
palm prints- compares the ridges on a
20. hand veins- scans the vein pattern on
the back on the hand
handwriting acoustic emissions-
analyses sounds generated with
someone signs their name
iris- a video image of the coloured
part of the eye is mapped by the
computer and each person is given an
individual code based on their iris
21.
22.
23.
24. The end!!!!
Presented by:
Mary Jesette E. Penaojas
BLIS-III
Presented to:
Mrs. Sheryl C. Farquerabao