Faculty of Science IT Department By Raz Dara MA.

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Chapter 1: Introduction.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Unit 2 - Hardware Computer Security.
Viruses & Destructive Programs
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Types of Electronic Infection
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Computer Skills and Applications Computer Security.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Information Systems Design and Development Security Risks Computing Science.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Computer safety Filip Hruby.
Chapter 40 Internet Security.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
3.6 Fundamentals of cyber security
IT Security  .
Instructor Materials Chapter 7 Network Security
Lecture 8. Cyber Security, Ethics and Trust
Network security threats
Cyber Security By: Pratik Gandhi.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
COMPUTER CRIME.
How to Get Rid of Online Threats Impacting your Computer Device?
Tool Server Workstation Router Universal
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Risk of the Internet At Home
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
Chapter 10: Privacy, Security, and Ethics
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
ISNE101 Dr. Ken Cosh Week 13.
The Internet of Unsecure Things
Security.
INFORMATION SYSTEMS SECURITY and CONTROL
– Communication Technology in a Changing World
How to keep the bad guys out and your data safe
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Securing Information Systems
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Securing your system, protecting your digital data and devices.
Test 3 review FTP & Cybersecurity
Chapter Goals Discuss the CIA triad
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Privacy, Security, and Ethics
An overview over Botnets
Presentation transcript:

Faculty of Science IT Department By Raz Dara MA. Computer Security Faculty of Science IT Department By Raz Dara MA.

What is computer security? Computer Security is the process of preventing and detecting unauthorized use of your computer. It involves the process of safe guarding against intruders from using your computer resources for malicious intents. Intruder :An attacker that gains, or tries to gain, unauthorized access to a system malicious: intended to harm or upset other ... to a computer system, or to steal private information from a computer system

Computer Security is concerned with four main areas: Confidentiality:- Only authorized users can access the data resources and information. Integrity:- Only authorized users should be able to modify the data when needed. Availability:- Data should be available to users when needed. Authentication:- are you really communicating with whom you think you are communicating with.

Why is computer security so important? Prevention of data theft such as bank account numbers, credit card information, passwords, work related documents or sheets, etc. is essential in today’s communications since many of our day to day action Data present in a computer can also be misused by unauthorized intrusions' depend on the security of the data paths. An intruder can modify and change the program source codes and can also use your pictures or email accounts to create nasty content such as inappropriate images, fake misleading and offensive social accounts. 

Why is computer security so important? Malicious intents can also be a factor in computer security. Intruders often use your computers for attacking other computers or websites or networks for creating big destructions.. Vengeful hackers (Bad) might crash someone’s computer system to create data loss. DDOS (distributed denial of service ) attacks can be made to prevent access to websites by crashing the server.  Above factors imply that your data should remain safe and confidential. Therefore, it is necessary to protect your computer and hence the need for Computer Security arises. 

The most widely used attacks against a computer system Trojans/trapdoors Worms viruses social networking and eavesdropping(man-in-the- middle attack) Also popular are DoS/DDoS attacks, which can be used to disrupt services. Deterrents =prevention Intrusion = attack or disturbance

Trojan/trapdoors A Trojan horse or Trojan is a type of malware that is often masked as legal software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. Malware : software which is specifically designed to disrupt, damage, or gain authorized access to a computer system.

Computer WORM A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access.

Computer Viruses A computer virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user. A virus must meet two criteria: It must execute itself. It will often place its own code in the path of execution of another program. It must replicate itself. For example, it may replace other executable files with a copy of the virus infected file. Viruses can infect desktop computers and network servers alike.

Man in the Middle Attack Bob, Eve( Classmates!) want to communicate “securely” Nancy(intruder) may intercept, delete, add messages secure sender receiver channel data, control messages data Eve Bob Nancy

DDoS Attack DDoS is short for Distributed Denial of Service. DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan , are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.

How to Prevent Attacks Measures include installing legally purchased software, as they are generally free from such Trojans or viruses, using good anti-virus solutions with properly defined system rules. Hardware and software firewalls help in blocking unauthorized users from accessing your computer. Using a large complex password comprising of several special characters, numbers and alphabets in making it largely impossible for a hacker to crack your account easily. Cryptography (especially encryption) plays an important role in keeping our sensitive information safe and secret.

Questions ???