Computer Security By: Muhammed Anwar.

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BUSINESS B1 Information Security.
Viruses & Destructive Programs
C8- Securing Information Systems
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Types of Electronic Infection
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Information Systems Design and Development Security Risks Computing Science.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Cyber security. Malicious Code Social Engineering Detect and prevent.
How To Remove Flooders?-Get Help Website:
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Computer safety Filip Hruby.
Chapter 40 Internet Security.
Network security Vlasov Illia
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Port Knocking Benjamin DiYanni.
3.6 Fundamentals of cyber security
CYBER SECURITY...
IT Security  .
Instructor Materials Chapter 7 Network Security
Lecture 5. Security Threats
Network security threats
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Year 10 ICT ECDL/ICDL IT Security.
COMPUTER CRIME.
Tool Server Workstation Router Universal
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Risk of the Internet At Home
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
ISNE101 Dr. Ken Cosh Week 13.
Forensics Week 12.
Security.
Faculty of Science IT Department By Raz Dara MA.
– Communication Technology in a Changing World
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
How to keep the bad guys out and your data safe
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Securing Information Systems
Cyber security and Computer Misuse
Chapter # 3 COMPUTER AND INTERNET CRIME
Securing your system, protecting your digital data and devices.
WJEC GCSE Computer Science
Test 3 review FTP & Cybersecurity
Chapter Goals Discuss the CIA triad
Marcial Quinones-Cardona
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Privacy, Security, and Ethics
An overview over Botnets
Presentation transcript:

Computer Security By: Muhammed Anwar

What is computer security? Computer Security is the process of preventing and detecting unauthorized use of your computer. It involves the process of safeguarding against intruders from using your computer resources for malicious intents

Computer Security is concerned with four main areas: 1. Confidentiality:- Only authorized users can access the data resources and information. 2. Integrity:- Only authorized users should be able to modify the data when needed. 3. Availability:- Data should be available to users when needed. 4. Authentication:- are you really communicating with whom you think you are communicating with.

Why is computer security so important? Prevention of data theft such as bank account numbers, credit card information, passwords, work related documents or sheets, etc. is essential in today’s communications since many of our day to day action Data present in a computer can also be misused by unauthorized intrusions' depend on the security of the data paths. An intruder can modify and change the program source codes and can also use your pictures or email accounts to create derogatory content such as pornographic images, fake misleading and offensive social accounts. 

Why is computer security so important? Malicious intents can also be a factor in computer security. Intruders often use your computers for attacking other computers or websites or networks for creating havoc. Vengeful hackers might crash someone’s computer system to create data loss. DDOS attacks can be made to prevent access to websites by crashing the server.  Above factors imply that your data should remain safe and confidential. Therefore, it is necessary to protect your computer and hence the need for Computer Security arises. 

Deterrents to maintaining safety and measures that can be taken to prevent intrusion:-  The most widely used attacks against a computer system are Trojans/trapdoors Worms social networking and eavesdropping(man-in-the-middle attack) Also popular are DoS/DDoS attacks, which can be used to disrupt services. Deterrents =prevention Intrusion = attack or disturbance

Trojan/trapdoors A Trojan horse or Trojan is a type of malware that is often masked as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system.

Computer WORM A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access.

Man in the Middle Attack is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. One example of man-in-the- middle attacks is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.

DDoS Attack DDoS is short for Distributed Denial of Service. DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.

How to Prevent Attacks Measures include installing legally purchased software, as they are generally free from such Trojans or viruses, using good anti-virus solutions with properly defined system rules. Hardware and software firewalls help in blocking unauthorized users from accessing your computer. Using a large complex password comprising of several special characters, numbers and alphabets in making it largely impossible for a hacker to crack your account easily. Cryptography (especially encryption) plays an important role in keeping our sensitive information safe and secre