Computer Security Damian Gordon.

Slides:



Advertisements
Similar presentations
Operating system Part four Introduction to computer, 2nd semester, 2010/2011 Mr.Nael Aburas Faculty of Information.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
System Calls B.Ramamurthy (Adapted from Tannenbaum’s text)
LAN Management © Abdou Illia, Spring 2007 School of Business Eastern Illinois University 3/6/2007 Lab.
System Software, functions of an operating system
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Computer Networks.
Ajmer Singh PGT(IP) Software Concepts. Ajmer Singh PGT(IP) Operating System It is a program which acts as an interface between a user and hardware.
By Julia Nguyen B2. What is it?  Networking is two or more computers linked together  Two common types are Local Area Network (LAN) and Wide Area Network.
Section 6 Theory Software Copyright, Viruses and Hacking.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Introduction to Interactive Media Interactive Media Tools: Software.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Operating Systems Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Advantages of Using a Network By Ryan Riddell. Shared Files The same files can be accessed from different computers on the network Files can be traded,
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,
By Mohammad Alsawwaf. To apply the theory part from my last presentation into the application part (The lab)
Introduction to Security Dr. John P. Abraham Professor UTPA.
Lecture 1: Network Operating Systems (NOS) An Introduction.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Networking Network Classification, by there: 3 Security And Communications software.
3.Data Communications 3.3Network Operating Systems.
Jake Horsfield (P3/D1) PURPOSE OF SOFTWARE UTILITIES.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction to Networking. What is a Network? Discuss in groups.
After you sync your OneDrive for Business files with your computer, you can manage your files like other files on your computer. You move, rename, and.
Ch 21. Computer Network Firewall. What is firewall? Hardware and Software Installed in a computer to protect only one computer.
LOGO Technical English E-commerce. Logo Contents E-commerce companiesE-commerce featuresTransaction securityOnline transactions.
SECURE NETWORKS Device detects all network within radius Secure networks require SSID Password ENCRYPTION Translated into code Uses a mathematical Key.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
ITMT Windows 7 Configuration Chapter 6 – Sharing Resource ITMT 1371 – Windows 7 Configuration 1.
Cabling System & Wireless LAN
Computer Organisation
3.1 Types of Servers.
Introduction to Operating Systems (Summary)
Using iLocker.
KeePass Password Safe Dan Koller Jesse Cowan.
3.1 Types of Servers.
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
Lesson Objectives Aims You should be able to:
Local Area and Wide Area Networks
(On lined paper) Objective: to learn about the fire wall
GRADE ANALYSIS SYSTEM WBS
FTP - File Transfer Protocol
Answer the questions to reveal the blocks and guess the picture.
Big Picture How many ways can a system be attacked? What can we do about it?
مقدمة في الحاسب الآلي T. Arwa Alsarami.
OPERATING SYSTEMS.
ONE® Pages Training Presentation
Local Area and Wide Area Networks
System Calls.
Operating Systems Security
Introduction to Systems Security
Unit 1: Introduction to Operating System
An Introduction to Cloud Computing
Encryption and Hacking
Encryption and Hacking
Operating Systems Tasks 17/02/2019.
Operating Systems Tasks 04/04/2019.
Online Learning.
Week1 software - Lecture outline & Assignments
Computer Security (Summary)
Protection Mechanisms in Security Management
Operating Systems Tasks 05/08/2019.
Presentation transcript:

Computer Security Damian Gordon

Operating System File Manager Memory Manager Process Manager Device Network Manager

Operating System File Manager Memory Manager Process Manager Device Network Manager Security Manager

Contents Introduction to OS Security Types of Attacks Types of System Protection Summary

Operating System Security The operating system uses a number of different ways to protect the system: Your credentials (e.g. username and password) Your authorisation (e.g. drwxr-x-r--) Your location (e.g. inside/outside the LAN) Your behaviour (e.g. deleting lots of files) The firewall