Anda di halaman 1dari 14

A GRAND WELCOME TO YOU

MY
FRIENDS
PROJECT WORK OF
COMPUTER
BY:
10B students:
- Ajaya Subedi
- Pratik Hadkhale
- Anupam
Bastakoti
- Kapil Subedi
- Ashim Poudel
- Sushank Poudel
- Anushandhan
Tripathi

A presentation on:
Software security
By : 10 B Students

Work given by: Mr. Prakash Kshetrie

What is computer security?


Computer security
refers to the
technique for
insuring that data
stored in computer
cannot be read or
compromised by any
individual without
authorization.

The purpose of
computer security is
to device ways to
prevent the
weakness from
being exploited.

Most computer
security measures
involve data
encryption and
password.

Computer Security
provides barriers
and other cybertools that protect
files, programs, and
information to flow
from one pc to next.

WHY?
To protect your PC from
hackers, crackers,
exploiters, Script kiddie
etc.
Secure PC from
unauthorized use by
unauthorized person.
Protect ones computer
from virus, Trojan horse,
Worms and rootkits etc.
Protection of hardware
components like power
fluctation, dust, smoke,
fire, overheat, etc.

Work given by: Mr. Prakash Kshetrie

Hardware Security:
Concerned to hardware
components to protect,
check,

Software Security

Computer security:
As Computer Security is concerned to both hardware and
software , there are two types of security:
1.Hardware Security
2. Software Security

Hardwa
re
Security

Concerned to
hardware
components to
protect, check,
maintain various
things from being
damaged or
Methods:
destroyed.
-Regular
Mintainance
- Free from dust,
fire.
- Potection from
theft
etc.

Softwar
e
Security

Concerned to
Software
components to
protect and
secure various
data, information,
programs, from
being lost or
Methods:
damaged.
- Password
Protection.
- Backup System
- Defragmentation
etc.
Work given by: Mr. Prakash Kshetrie

Software security Risks:


Malicious Softwares(Malwares)
Malicious softwares may be hidden inside another file or
program or run silently in the background. Most malicious
programs are designed to replicate itself or infect other
files in the computer.
But what actually malicious code does to your computer
depends upon what is it and how destructive it is.
Some such malwares are:
1. Virus:
Software or code written with the express intension of
replicating itself. A virus attempts to spread from
computer to computer by attaching itself to another file
or program.
2. Worm:
Work given by: Mr. Prakash Kshetri

Software Security Risks:


3. Trojan horse:
Software that appears to be useful or harmless but that
contains hidden code designed to exploit or damage the
system on which it runs.
4. Spyware:
Soft wares that can display advertisements(such as pop-up
ads), collect information about you, or change settings into
computer .You usually download spyware without knowing it
by visiting untrustworthy websites.
CREATER OF SUCH MALWARES:
Hacker and cracker
Script kiddie
Corporate Spy
Unethical employee
Cyber Extortionist

Work given by: Mr. Prakash Kshetrie

Software Security:
The practice of keeping data, programs,information or
software protected from being lost, corrupt, pirated or
damaged by accidental or intentional harm is known as
software security.
Among various software security measures some of the
common software security measures are as follows:
MEASURES
- Password Protection
- Backup System
- Hard lock key
- Disk Defragmentation
- Scan disk
- Anti-Virus
Work given by: Mr. Prakash Kshetrie

Software Security:

1. Password Protection
Password Protection is such protection that are easier,
reliable, and popular way of protecting data and
program in the computer system.
One of the most important security measures we use
nowadays.
Password is a set of characters that gives access to a
particular file, folder, program, or computer system.
Passwords are used commonly to gain entry to
networks and into various Internet accounts in order to
authenticate the user accessing the website.
It allows only those with an authorized password to
gain access to certain information and prevent from
being used by any unauthorized persons.
Work given by: Mr. Prakash Kshetrie

Software Security:

1. Password Protection
HOW TO MAKE STRONG PASSWORD
As passwords are very important it is necessary to create a
password that cannot be easily guessed, one that cannot
be easily cracked. Password can be made secure by:
1. Avoid using Common Passwords
2. Use Different Passwords Everywhere
3. Change password from time to time
4. Create password by combining uppercase and
lowercase letters and symbols
5. Password should be easy to remember but difficult to
guess

Work given by: Mr. Prakash Kshetrie

Software Security:

2. Backup System:
Backup is the activity of copyingfiles ordatabases so
that they will be preserved in case of equipment failure
or other catastrophe.
One of the best method for securing data and program.
Sometimes our data can be erased or corrupt and in that
case backup system helps to retrieve our lost data.
There are mainly two means of backing up data

1.Local backup
It is abackup where the storage medium is kept close at
hand.
Typically, the storage medium is plugged in directly to the
source computer being backed up or is connected through
a local area network to the source being backed
Workup.
given by: Mr. Prakash Kshetrie

Software Security:

2. Backup System:
Examples of local backup:

Internal hard drive


External hard drive (desktop or portable)
Optical drives like CDs, DVDs and Blue Ray discs
USB Thumb drives or Flash Drives
Network Attached Storage (NAS)
Backup to a shared folder on another computer over the
network

Work given by: Mr. Prakash Kshetrie

Software Security:

2. Backup System:
It is a method of offsite data storage in which files, folders,
or the entire contents of a hard drive are regularly backed
up on a remote server or computer with a network
connection.
The rationale behind online backup is simple. By frequently
backing
up data on a remote hard drive, the risk of catastrophic
data loss as a result of fire, theft, file corruption, or other
disaster is practically eliminated.
With a high-speed Internet connection and a Web browser
interface, the remote files and folders appear as if they are
stored on an external local hard drive.

Work given by: Mr. Prakash Kshetrie

Software Security:

2. Backup System:
Hard lock key
Hard lock is a versatile software and data protection
system.
It offers the advantage of all hardware modules responding
to the same calls.
It reduces the effort required for programmers and
customers a choice of the protection module, without
having to alter your code.
Defragmentation
Fragmentation occurs when old files are deleted and new
files are added.

Work given by: Mr. Prakash Kshetrie

Anda mungkin juga menyukai