WELCOMETo Our
Presentation …
•ZULFIKAR PASHA DIPTO (024)
•FARAH AMIRA KHAN (025)
PRESENTED BY…
About How to make a secured business using Computer…
First of All…
1.Necessity…
2.Objective…
3.Scope…
MethodologyQualitative Research
Possible Solution
Problems…
Identity TheftHard Disk Crash
Network security ThreatUnauthorized access
Virus Attack Privacy Breach
Authenticity LackingsMalwareSpyware
Details With Solution
Identity Theft• Illegal Access• False Identity
But…Authentic ID
Solution• Legacy Checking• ID Verification System
Hard Drive Crash• Overloaded• Crash & Destroy
Solution• Ensure Huge Space• Cloud Backup
Network Security Threat• Securing Info• Unauthorized Access• Use, Modification, Tempering,
Disclosure
Network Security Threat• Unauthorized Access• Virus Attack• Privacy Breach• Authenticity• Malware• Spyware
Unauthorized Access• illegal access • Unauthorized Person
Solution• Strong Password• Authorization Confirmation
Checking
Virus Attack• Common Phenomenon • Harmful Programme• Destroy valuable Folder
Solution• Anti-Virus• Avoid Unknown number
Privacy Breach• Privacy Compromised• Free access of Data• Intercept of Data
Solution• Strong Password• Free Access of Data
Authenticity• Lack of Reliability• False• Posing as Genuine person
Solution• Ensuring Reliability• Stop Free Access of Data
Malware• User is forced to download• Act like a useful & harmless software
Solution• Use AD Blocker• Become ensuring the safety
Spyware• Monitoring• Reporting
Solution• Encrypt Data• Secret Meeting• Anti Virus
Security (Portable Devices)
Bio-Metric Security system