Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Section C Threats to Data.
POSSIBLE THREATS TO DATA
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Data Security GCSE ICT.
Video Following is a video of what can happen if you don’t update your security settings! security.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1.1 System Performance Security Module 1 Version 5.
Computer Security, Ethics and Privacy Chapter 11.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification. Security.
Security Issues, Ethics, & Emerging Technologies in Education
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
VIRUS.
Computer Skills and Applications Computer Security.
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Chapter Objectives In this chapter, you will learn:
Introduction to Computers
MALWARE Autumn Mattis.
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Instructor Materials Chapter 7 Network Security
Lecture 8. Cyber Security, Ethics and Trust
Network security threats
CHAPTER 6 – BASIC SECURITY
Cyber Security By: Pratik Gandhi.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
How to Get Rid of Online Threats Impacting your Computer Device?
Computer Technology Notes 5
Unit 11 Task #1 Read the unit specification and create a glossary which defines each of the words / terms you don’t know.
Viruses, Malicious Code, & Other Nasty Stuff
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
20332 security Legal and ethical issues when a business is providing internet access for individuals © EIT, Author Gay Robertson, 2016.
Computer Viruses.
Utility Programs.
Computer Security.
Computer Security.
برنامج أمن أنظمة الحاسب
INFORMATION SYSTEMS SECURITY and CONTROL
Fire-wall.
Faculty of Science IT Department By Raz Dara MA.
Unit 4 IT Security Kerris Davies.
Computer Security By: Muhammed Anwar.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Presentation transcript:

Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or modification. E.g. hacker,crackers and script kiddie.

Type of security Hardware security refers to security measure used to protect the hardware specifically the computer and its related documents. E.g: PC-locks, keyboard-locks, smart cards and biometric devices Software/data security refers to the security measures used to protect the software and the loss of data files. E.g: activation code and serial number. Network security refers to security measure used to protect the network system. E.g: firewall.

Types of security threats Malicious code is known as a rogue program. Virus is a program that can pass on the malicious code to other program by modifying them. Trojan horse is a program which can perform useful and unexpected action. Logic bomb is a malicious code that goes of when a specific condition occurs. E.g: time bomb. Trapdoor or backdoor is a feature in a program that allows someone to access the program with special privileges. Worm is a program that copies and spreads itself through a network.

Differences between worm and virus Operates through the network. Spreads copy of itself as a standalone program. Spreads through any medium. Spreads copies of itself as a program that attaches to other programs.

Hacker is a source of threat to security in computer Hacker is a source of threat to security in computer. It is defined as unauthorised access to the computer system by a hacker. Natural and environmental disaster are flood, fire, eartquakes, storms, tornados, excessive heat and inadequate power supply. Theft consists of two types: Computer is used to steal money, goods, information and resources. Stealing of computer especially notebook and PDAs.

Security measures Data backup is a program of file duplication. Backups of data application are necessary so that they can be recovered in case of an emergency. Cryptography is a process of hiding information by altering the actual information into different representation, for example an APA can be written as I? X.

Antivirus is a program protects the computer againts viruses by identifying and removing any computer virus found in the computer memory, on storage media or incoming emeil files. Two thecnique are used to identify the virus are virus signature and inoculating a program files. Anti-spyware is a program places on a computer without the users knowledge. It secretly collect information about the users.

Firewall is a piece of hardware or software which function in a network environment to prevent some communication forbidden by the security policy. Types of firewall are screening routers, proxy gateway and guard. Human aspect of security measure refer to the user and also the intruder of a computer system. Human aspect are organisation self awareness. Organisational users self awareness an individual user self awareness,