SlideShare uma empresa Scribd logo
1 de 9
COMPUTER SECURITY Present by : ∂   Alya   ∂ ∂   Amira   ∂ ∂   Shahida   ∂ ∂   Mas   ∂ ∂   Lyana   ∂
SECURITY MEASURES ,[object Object],[object Object],[object Object]
Definition ,[object Object],[object Object],[object Object]
Organisations of Self Awareness ,[object Object]
Organisational User Self Awareness ,[object Object],[object Object]
Individual User Self Awareness ,[object Object],[object Object],[object Object]
Firewall
Definition ,[object Object]
Types of firewall ,[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Semelhante a Ict - Computer Security

Digital physical security[present]
Digital physical security[present]Digital physical security[present]
Digital physical security[present]Zawawi Mohamad
 
digital cyber security .pptx
digital cyber security .pptxdigital cyber security .pptx
digital cyber security .pptxRajkumar403393
 
Defender economics
Defender economicsDefender economics
Defender economicsaddelindh
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdfonline Marketing
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - IdealwareIdealware
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?NTEN
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12ANURAGYADAV265
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Tips To Keep Your Technology Secure.pptx
Tips To Keep Your Technology Secure.pptxTips To Keep Your Technology Secure.pptx
Tips To Keep Your Technology Secure.pptxdanieljones0094
 
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014Invincea, Inc.
 
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014Invincea, Inc.
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 

Semelhante a Ict - Computer Security (20)

Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
Digital physical security[present]
Digital physical security[present]Digital physical security[present]
Digital physical security[present]
 
digital cyber security .pptx
digital cyber security .pptxdigital cyber security .pptx
digital cyber security .pptx
 
Defender economics
Defender economicsDefender economics
Defender economics
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Team black
Team blackTeam black
Team black
 
How to Protect Your Network from Firewall Hacking.docx
How to Protect Your Network from Firewall Hacking.docxHow to Protect Your Network from Firewall Hacking.docx
How to Protect Your Network from Firewall Hacking.docx
 
Tips To Keep Your Technology Secure.pptx
Tips To Keep Your Technology Secure.pptxTips To Keep Your Technology Secure.pptx
Tips To Keep Your Technology Secure.pptx
 
Firewalls
FirewallsFirewalls
Firewalls
 
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
 
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Chris D'Aguanno
Chris D'AguannoChris D'Aguanno
Chris D'Aguanno
 

Mais de aleeya91

~History Of Malaysia~
~History Of Malaysia~~History Of Malaysia~
~History Of Malaysia~aleeya91
 
How To Use Anti Spyware
How To Use Anti SpywareHow To Use Anti Spyware
How To Use Anti Spywarealeeya91
 
Ict - Motherboard
Ict - MotherboardIct - Motherboard
Ict - Motherboardaleeya91
 
Ict - Programming
Ict - ProgrammingIct - Programming
Ict - Programmingaleeya91
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethicsaleeya91
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 

Mais de aleeya91 (6)

~History Of Malaysia~
~History Of Malaysia~~History Of Malaysia~
~History Of Malaysia~
 
How To Use Anti Spyware
How To Use Anti SpywareHow To Use Anti Spyware
How To Use Anti Spyware
 
Ict - Motherboard
Ict - MotherboardIct - Motherboard
Ict - Motherboard
 
Ict - Programming
Ict - ProgrammingIct - Programming
Ict - Programming
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Ict - Computer Security