Presentation is loading. Please wait.

Presentation is loading. Please wait.

By Arisara Sangsopapun

Similar presentations


Presentation on theme: "By Arisara Sangsopapun"— Presentation transcript:

1 By Arisara Sangsopapun
Security By Arisara Sangsopapun

2 What is computer security
Prevention prevent assets from being damaged Detection allow you detect when asset has been damaged Reaction allow you recover asset

3 Threats, Vulnerabilities and Attacks
is any incidences that have an undesirable effect on asset Vulnerability is some unfortunate characteristic that makes it possible for a threat Attack is some action involves the exploitation of certain vulnerabilities and leads to threat

4 Types of Threats Disclosure Threat Integrity Threat
the dissemination of information to an individual for whom that information should not be seen Integrity Threat any unauthorized change to information stored on a computer system Denial of Service Threat occurs when access to computer system resource is intentionally blocked as a result of bad action taken by another user

5 Trojan Horses and Viruses
any program that is expected to perform some desirable function, but it actually performs some undesirable function Viruses virus can reproduce itself and infect other program

6 Common Attack Methods Password Spoof program Logic Bomb
spoofing the use to believe that computer is correctly and prompting that user for login and password information Logic Bomb is coded embedded in some program that is set to explode when certain criteria are met

7 Simple Attack Prevention Methods
Individual Screening Checking the background, credentials, family and other personal information of individual who can possible attack Physical Controls securing the facility and enclosure the surrounding a computer system. Care in Operations being careful in our own activities to avoid common types of attack


Download ppt "By Arisara Sangsopapun"

Similar presentations


Ads by Google