Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security+ Guide to Network Security Fundamentals
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Internet safety By Lydia Snowden.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
BUSINESS B1 Information Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Introduction to Computer Security PA Turnpike Commission.
ACM 511 Introduction to Computer Networks. Computer Networks.
Chapter 2 Securing Network Server and User Workstations.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
8 – Protecting Data and Security
Security Issues in Information Technology
Managing Windows Security
BUSINESS DRIVEN TECHNOLOGY
Add video notes to lecture
Instructor Materials Chapter 7 Network Security
Lecture 8. Cyber Security, Ethics and Trust
Lecture 5. Security Threats
Network security threats
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Security in Networking
Computer Security Elaine Munn Introduction to Computer Security.
Computer Ethics.
– Communication Technology in a Changing World
BCT 2.00 Analyze Technology Issues
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
ISNE101 Dr. Ken Cosh Week 13.
Protecting Your Information Assets
INFORMATION SYSTEMS SECURITY and CONTROL
HOW DO I KEEP MY COMPUTER SAFE?
Fire-wall.
Faculty of Science IT Department By Raz Dara MA.
Unit 4 IT Security Kerris Davies.
Computer Security CIS326 Dr Rachel Shipsey.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Mohammad Alauthman Computer Security Mohammad Alauthman
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Computer Security CIS326 Dr Rachel Shipsey.
Chapter 5 Computer Security
Presentation transcript:

Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek Computer Security Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek Hello; Thank you Overview of computer security and good computing practices. This is kind-of a whirlwind overview, so the handout that you have has additional information and details about any of the things that I will be talking about.

Outline Definition of Computer Security Why should I care about computer security? Who would want to break into your computer at home? The difference between hackers and crackers What can an attacker do to your computer? Types of Attacks What features should a computer security system provide? Understanding security and safer computing What is ethics? Common Ethical Issues for IT Users The general topics I will be covering are <Read Topics> My expectation is that much of what I cover will be familiar to you, and that’s a good thing. One goal of computer security training is to reinforce and confirm and update good computing practices that people already know about, so they remain in the front of your mind. And then hopefully through the course of this overview there will be a couple of gems or new things that you can take away, as well.

Definition of Computer Security Computer security is the process of preventing and detecting unauthorized use of your computer.

Isn’t this just an IT Problem? <Read slide> And the answer is: Well, not really…

Why should I care about computer security? Protects the information in your computer starting from your system files, personal files, backup files up to your temporary files. Protect fundamental information while still allowing access to those who need it Trade secrets, medical records, etc. Provide authentication and access control for resources. Guarantee availability of resources.

What we have seen so far? Authentication Access control Encryption

Who would want to break into your computer at home? Intruders (also referred to as hackers, attackers, or crackers) may not care about your identity. Often they want to gain control of your computer so they can use it to launch attacks on other computer systems.

The difference between hackers and crackers Hackers- Are people who gain unauthorized access to computer system for the fun and challenge of it Crackers - Is someone who breaks into computers, often to do something hateful such as steal credit card information

What can an attacker do to your computer? a) Hide programs that launch attacks b) Generate large volumes of unwanted traffic, slowing down the entire system c) Distribute illegal software from your computer d) Access controlled information (e.g. identity theft) e) Record all of your keystrokes and get your passwords

Types of Attacks Security events can take many forms, but one of the most frequent is an attack on a networked computer from outside source. Most attacks involve: Viruses Worms Trojan Horses

What features should a computer security system provide? Confidentiality The prevention of unauthorized disclosure of information. Confidentiality is keeping information secret or private. Confidentiality might be important for military, business or personal reasons. Integrity Integrity is the unauthorized writing or modification of information. Integrity means that there is an external consistency in the system - everything is as it is expected to be. Data integrity means that the data stored on a computer is the same as the source documents. Availability Information should be accessible and useable upon appropriate demand by an authorized user. Availability is the prevention of unauthorized withholding of information. Denial of service attacks are a common form of attack.

Understanding security and safer computing These are ways to help protect your computer against potential security threats: Firewall. A firewall can help protect your computer by preventing hackers or malicious software from gaining access to it. Virus protection. Antivirus software can help protect your computer against viruses, worms, and other security threats. Spyware and other malware protection. Antispyware software can help protect your computer from spyware and other potentially unwanted software. Windows Update. Windows can routinely check for updates for your computer and install them automatically.

How a firewall work

Instructions for safely using e‑mail and the web Use care when opening e‑mail attachments. Guard your personal information carefully. Be careful when clicking hyperlinks in e‑mail messages.

What is ethics? Ethics is concerned with what is good for individuals and society and is also described as moral philosophy.

Common Ethical Issues for IT Users Inappropriate Sharing of Information Organizations stored huge amount of information that can be classified as private or confidential. Private data describes individual employees (for example, salary, attendance, performance rating, health record). Confidential information describes a company and its operations: sales, promotion plans, research and development.

Cont :Common Ethical Issues for IT Users Supporting The Ethical Practices of IT Users Companies must develop, communicate and implement written guidelines that encourage employees to respect business IT resources and use them to enhance their job performance.

Cont: Common Ethical Issues for IT Users Establishing Guidelines for Use of Company Software Company IT managers must provide clear rules that rule the use of home computers and associated software. The goal should be to ensure that employees have legal copies of all software

Cont: Common Ethical Issues for IT Users Structuring Information Systems to Protect Data and Information Employees should be illegal from accessing the data about research and development results.

Cont: Common Ethical Issues for IT Users Installing and Maintaining a Corporate Firewall Firewall is a software or hardware device that serves as a barrier between a company and the outside world and limits access to the company’s network based on the Internet usage policy.