Computer presentation

42
WELCOME To Our Presentation …

Transcript of Computer presentation

WELCOMETo Our

Presentation …

•ZULFIKAR PASHA DIPTO (024)

•FARAH AMIRA KHAN (025)

PRESENTED BY…

About How to make a secured business using Computer…

Let’s Go…

First of All…

1.Necessity…

2.Objective…

3.Scope…

MethodologyQualitative Research

Possible Solution

Research Work…

Two ?

Problems…

Identity TheftHard Disk Crash

Network security ThreatUnauthorized access

Virus Attack Privacy Breach

Authenticity LackingsMalwareSpyware

Details With Solution

Identity Theft• Illegal Access• False Identity

But…Authentic ID

Solution• Legacy Checking• ID Verification System

Hard Drive Crash• Overloaded• Crash & Destroy

Solution• Ensure Huge Space• Cloud Backup

Network Security Threat• Securing Info• Unauthorized Access• Use, Modification, Tempering,

Disclosure

Network Security Threat• Unauthorized Access• Virus Attack• Privacy Breach• Authenticity• Malware• Spyware

Unauthorized Access• illegal access • Unauthorized Person

Solution• Strong Password• Authorization Confirmation

Checking

Virus Attack• Common Phenomenon • Harmful Programme• Destroy valuable Folder

Solution• Anti-Virus• Avoid Unknown number

Privacy Breach• Privacy Compromised• Free access of Data• Intercept of Data

Solution• Strong Password• Free Access of Data

Authenticity• Lack of Reliability• False• Posing as Genuine person

Solution• Ensuring Reliability• Stop Free Access of Data

Malware• User is forced to download• Act like a useful & harmless software

Solution• Use AD Blocker• Become ensuring the safety

Spyware• Monitoring• Reporting

Solution• Encrypt Data• Secret Meeting• Anti Virus

Utility Software

Data Encryption

Strong Password

Cloud Backup

Security (Portable Devices)

Avoid Spam Mail

More Security….

CC Camera

IT Expert

Keep Updated

Bio-Metric Security system

Thank You

Question Please…