You are on page 1of 10

SECURITY

MEASURE
S
Name:SUHAILA OSMAN
Class:5Cemerlang
INTRODUCTION
 Today, people rely on computer to create , store and
manage critical information.It is important that the
computer and the data they stored are accesible and
avaiable when needed.It is also important that user take
measures to protect their computers and data from
lose,damage and missue.How do we protect our computer
from breaches of security and our security risk?

 There are 6 types of security measures:

 -Data backup
 -Cryptography
 -Anti-Virus
 -Anti-Spyware
 -Firewall and human aspects
AUTHENTICATION METHOD
 There are 2 commonly used Authentication
Methods :

 -Biometric Device
 -Callback device
CONTENT
 -Introduction
 -Authentication

 -Authentication Method

 -Biometric Device

 -Callback System

 -Conclusion

 -Refrences
AUTHENTICATION
 Authentication is a process where users
verify that they are who they say they
are.The user who attempts to perform
functions in a system is in fact the user who
is authorized to do so
 Authentication is important in order to
safeguard against the unauthorized access
and use
BIOMETRIC DEVICE
 -A device that translate personal
characteristics into a digital code that is
compared with a digital code stored in the
dataase.
 -Example of bioemetric devices are :
 -Fingerprint recognition
 -Facial recognition
 -Iris scaning
 -Retinal Scanning
 -Voice recognition
 -Signature verification system
 -Hand Geometry
CALLBACK SYSTEM
 -Refers to the checking system that authenticates the
user
 -This is commonly used in the bank operation and
business transaction
 -For example , when you book a taxi service , the
operation will ask you to hang up and she will call you
back to confirm for the service required.
CONCLUSION
 -It is important that the computer and the
data they stored are accessible and avaiable
when needed.
 -It is also important that user take measures
to protect their computer and data from last ,
damage misuse.
REFRENCES
 I Collect information to helpful to me in my
ICT PROJECT which are :

 CD ICT
 ICT NOTE FROM BOOK FORM 4
 

THE
END

You might also like