Vous êtes sur la page 1sur 2

BTA 301: Unit 11 Task #3

System Safety and


Security


How It Works
The user enters his or her creden-
tials
The system accepts or denies
If validated, the serves saves the
user object into the session
This allows the user to obtain an
account solely for him or herself
Advantages
A single sign on
It will be easy to remember your
password if you have one for all
your accounts
Newer technologies are in the pro-
cess of figuring out if the user is a
hacker or not
Disadvantages
Many users use the same password,
so theres a greater chance of get-
ting hacked
Everything is on the
internet so its easier
for information to be
stolen
Must have a good
password to avoid
problems
LOGIN AND PASSWORD
B Y : E M I L I A M A R I A
F U R I 0 - R A M O S
How It Works
Used to scan files to get rid of
computer viruses and malware
Looks for known viruses
Looks for unusual behavior from
computer programs
Looking for unusual behavior pro-
tects the computer more as it stops
the virus before it can attack
Advantages
Protects your computer from virus-
es and malware
The software will notify you if you
have a virus and will remove it
right away
Disadvantages
The good software are high in cost
Sometimes you would have to run
virus scans or the viruses will not be
r e -
moved
Anti-Virus Software Firewall Encryption
How It Works
A software program that keeps out
hackers, viruses, and worms that are
found on the Internet
It will decide who can connect to the
Internet, and what kind of connec-
tions can be made
All traffic both ways are monitored
to secure the computer
Advantages
It can be used to trigger alarms
when something is wrong
They can use complicated rules to
see if the data should be let through
Disadvantages
Cant prevent users with modems, so
the firewall is useless at this point
How careless an employee acts
cant be stopped by firewalls
Cant stop people from being
tricked into re-
vealing personal
information
How It Works
Secures communication on the
Internet
To properly conduct public key
encryption, one should generate
large numbers so only you and
your computer know them
An encryption algorithm and key
are used together to make your
information unrecognizable
Advantages
Protects your personal
information on the Internet
Beneficial to those who shop
online, who chat on Skype and
iMessage, and all the people
who use the Internet
It isnt that easy to deconstruct
and encryption code
Disadvantages
If bad people get a hold of your
encryption code, all the
information encrypted is theirs
Professional hackers can
disregard encrypted information
all together and use graphics to
obtain the data

Vous aimerez peut-être aussi