Prepared By : Binay Tiwari

Slides:



Advertisements
Similar presentations
IT Security “Knowing the potential threat to YOU and your business” Ian McLachlan IT Manager.
Advertisements

4 Information Security.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Cyber X-Force-SMS alert system for threats.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Discovering Computers 2010
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Securing Information Systems
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
PART THREE E-commerce in Action Norton University E-commerce in Action.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Viruses & Destructive Programs
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Security in Computer System 491 CS-G(172) By Manesh T
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
 Introduction to Computing  Computer Programming  Terrorisom.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
Hurdles in implementation of cyber security in India.
Computer Skills and Applications Computer Security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
By: Mallory Thornton.  Social code of website  Cyber term  Derived from network and etiquette.
INTRODUCTION & QUESTIONS.
Safe’n’Sec IT security solutions for enterprises of any size.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Information Management System Ali Saeed Khan 29 th April, 2016.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
Securing Information Systems
Securing Information Systems
Cyber Security Zafar Sadik
CYBER SECURITY...
Unit 32 – Networked Systems Security
Threats By Dr. Shadi Masadeh.
Secure Software Confidentiality Integrity Data Security Authentication
Lecture 8. Cyber Security, Ethics and Trust
Lecture 5. Security Threats
Network security threats
CHAPTER 4 Information Security.
Year 10 ICT ECDL/ICDL IT Security.
Securing Information Systems
Scams, Identity Theft, and Viruses Kelly & Caitlin
Risk of the Internet At Home
Malware, Phishing and Network Policies
امنیت اطلاعات و ضرورت آن
1:53:58 AM.
Philip Nichilo Vincent Carestia
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Privacy, Security, and Ethics
Computer System Security
Presentation transcript:

Prepared By : Binay Tiwari Computer Security Prepared By : Binay Tiwari

Outline IS Vulnerability Types of Computer Crime Computer Security Computer Security Requirements Computer Crime by UnAuthorized Users. Potentially Malicious computer Programs.

IS Vulnerability Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK

Types of Computer Crimes Hacking Phishing Computer Viruses Cyber stalking Identity Theft

Computer Security Computer security is a branch of technology known as information security as applied to computers and networks. . The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users

Computer Security Requirements Secrecy Integrity Availability Authenticity Non-repudiation Access control

Potentially Malicious computer Programs Malicious Software-malware Viruses Worms Trojans

Computer Crime Through Unauthorized access Social Engineering Cracking Passwords

THANK YOU