Transcript IT-unit9

Unit 19
Data Security 2
Prepared by:Nahed AlSalah
Goal
 Scanning a table for specific details.
 Exchaning information orally.
 Writing a technical description.
Prepared by Nahed ALsalah
Page 1
Introducation

There are a variety of security measures that
can be used to protect the hardware (the
physical components of a computer system)
and software (programs and data ) including :
1. Controlling physical access to hardware
and software
2. Backuping up data and programs
(storing a copy of files on a storage
device to keep them safe).
Prepared by Nahed AlSalah
Page 3
Introducation
4. Implementing network controls such as
a) Using passwords ( a secret code used to control
access to a network system).
b) Installing a firewall ( a combination of a hardware
and software used to control the data going into
and out of a network. It is used to prevent
unauthorized access to the network by hackers).
c) Encrypting data ( protecting data by putting It in
a form only authorized users can understand).
Prepared by Nahed AlSalah
Page 4
Introducation
d) Installing a callback system ( a system that
automatically disconnects a telephone line after
receiving a call and then dial the telephone
number of the system that made the call , to
reconnect the line. It is used in remote access
system to make sure that connections can only
be made from permitted telephone numbers).
e) Using signature verification of biometric security
devices ( security devices that measures some
aspects of living being e.g. a fingerprint reader of
an eye scanner).
Prepared by Nahed AlSalah
Page 5
Introducation
4.
5.
Separating and rotating the computing functions
carried out by employees and carrying out periodic
audits of the system i.e. observing and recording
events on the network systematically.
Protecting against natural disasters by installing
uninterruptible power supplies ( battery backup
systems that automatically provided power to a
computer when the normal electricity source fails)
and surge protectors (electronic devices that
protect equipments from damage due to a sudden
surge in a power supply).
Prepared by Nahed AlSalah
Page 6
Introducation
6. Protecting against viruses by using antivirus

programs (computer programs used to detect,
identify and remove viruses from a computer system)
and ensuring that all software is free of viruses
before it is installed. Particular care must be taken
when using public domain software (free software)
and shareware (software that is free to try out but
must be paid for it is used after the trial period).
An anti-virus program is a program that checks files
for virus coding instructions inside another program
and can be used for removing any virus coding
instructions detected.
Prepared by Nahed AlSalah
Page 7
Introducation
Prepared by Nahed AlSalah
Page 8
Language Work:
Cause & Effect links
Cause & Effect (2) links using allow and prevent
What is the relationship between them
1- The scanner finds a match for your fingerprint.
2- the keyboard is unlocked.
3- You can use the PC.
1.
The way to link these sentences by :
(Cause to - make - when clause - an if-sentences therefore - with the result that )
Prepared by Nahed AlSalah
Page 9
Language Work:
Cause & Effect links
1.
2.
3.
4.
5.
6.
The scanner finds a match for your fingerprint which
causes the keyboard to be unlocked.
The scanner finds a match for your fingerprint which
makes the keyboard to be unlocked.
If the scanner finds a match for your fingerprint , the
keyboard is unlocked.
When the scanner finds a match for your fingerprint
,the keyboard to be unlocked.
The scanner finds a match for your fingerprint which
causes the keyboard to be unlocked.
The scanner finds a match for your fingerprint ,
therefore/with the result that the keyboard to be
unlocked.
Prepared by Nahed AlSalah
Page 10
Language Work:
Cause & Effect links
2.
The way to link these sentences by :
(permits – allows)

The keyboard is unlocked ,which allows /permits
you to use the PC.
OR

The keyboard is unlocked , allowing /permitting
you to use the PC.
Prepared by Nahed AlSalah
Page 11
Language Work:
Cause & Effect links
3.
The way to link these sentences by :
(prevent – stop )

The keyboard remains locked , preventing
you ( from) using the PC.
OR

The keyboard remains locked , stopping you
( from) using the PC.
Prepared by Nahed AlSalah
Page 12
The Answers:Key(5) page 135
1- when a user runs anti-virus software , the software checks files for
virus coding. If coding is matched to aknown virus in a virus
database , a message is displayed to the user that a virus has been
found. If the user removes the virus is prevented from spreading or
causing further damage.
2- when you approach a high-security network, key features of your face
are scanned. If the system matched your features to a database
record of authorized staff, your identity is verified allowing you to
log on. If your identity is verified , you are stiopped from using the
system.
3- Voice-activated computers without keyboards will become more
common, when the user wants to log on, she speaks to the
computer which matches her voice to a database of voice patterns.
If the user has cold or sore throat, she is allowed to use the system
because stress and intonation patterns remain the same.
Prepared by Nahed AlSalah
Page 13
The Answers:Key(5) page 135
1- when a user runs anti-virus software , the software checks files for
virus coding. If coding is matched to aknown virus in a virus
database , a message is displayed to the user that a virus has been
found. If the user removes the virus is prevented from spreading or
causing further damage.
2- when you approach a high-security network, key features of your face
are scanned. If the system matched your features to a database
record of authorized staff, your identity is verified allowing you to
log on. If your identity is verified , you are stiopped from using the
system.
3- Voice-activated computers without keyboards will become more
common, when the user wants to log on, she speaks to the
computer which matches her voice to a database of voice patterns.
If the user has cold or sore throat, she is allowed to use the system
because stress and intonation patterns remain the same.
Prepared by Nahed AlSalah
Page 14
The Answers:Key(8) page 137
Writing :
The LAN is protected by firewall gateway that
hides the internal IP addresses of the computers in
the LAN and filters network traffic going in and
out of the LAN. An internal firewall further protects
the database server and intranet by filtering the
network traffic and changing the network protocol
used on the internal part of the LAN. The firewall
modules are managed by a management server
which is positioned between the internal firewall
and the firewall gateway, as is the Web server.
Prepared by Nahed AlSalah
Page 15
Unit 19
Prepared by Nahed AlSalah
Page 16
Summary
The variety measures could be used to protect the
hardware and software.
The storage devices used in networks to store data .
Know the terms associated with data security ( such
as callback , incremental backup , full backups ,
biometric security devices, encrypt/ion, firewalls,
password protected, surge protectors, uninterruptible
power supplies, anti-virus, virus protection.
Should understand and be able to use: allow and
permit, prevent and stop links.
Prepared by Nahed AlSalah
Page 17
Unit 19
Prepared by Nahed AlSalah
Page 18