Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification. Security.

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

1 MIS 2000 Class 22 System Security Update: Winter 2015.
Crime and Security in the Networked Economy Part 4.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Security, Privacy, and Ethics Online Computer Crimes.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
FIT3105 Security and Identity Management Lecture 1.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Threats to I.T Internet security By Cameron Mundy.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Data Security GCSE ICT.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
Computer Security, Ethics and Privacy Chapter 11.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Security Issues, Ethics, & Emerging Technologies in Education
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Chap1: Is there a Security Problem in Computing?.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
Welcome Topic : Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Precautions Computing Science.
James Paik. What is a virus? A virus is a malicious program that can be executed on the computer and can cause damage to it.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Network security threats
UNIT 19 Data Security 2.
Cyber Security By: Pratik Gandhi.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
Data integrity and security
Faculty of Science IT Department By Raz Dara MA.
Security.
Operating System Concepts
Computer Security (Summary)
Presentation transcript:

Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification. Security measures Computer Threats

Computer Threats Security measures

We need to protect our computer from? Hackers Crackers virus

TYPE OF COMPUTER SECURITY HARDWARE SECURITY SOFTWARE / DATA SECURITY NETWORK SECURITY

TYPE OF COMPUTER SECURITY

1. HARDWARE SECURITY refers to security measures used to protect the hardware specifically the computer and its related documents. Example : PC-locks, Smart cards Biometric devices.

BIOMETRIC DEVICES

2. SOFTWARE / DATA SECURITY refers to the security measures used to protect the software and the loss of data files. Examples : Software - activation code and serial number Data - backup data

2. NETWORK SECURITY refers to security measures used to protect the network system. Example: Firewall Router

Computer Threats

1

VirusVirus or Worm designed to activate under certain conditionsWorm

A Virus or Worm designed to activate at a certain date/time e.g. Friday the 13 th and Michelangelo ( March 6th )VirusWorm Friday the 13 thMichelangelo

A small door that covers an opening in a roof or floor.

Trapdoor Trapdoor is malicious code that open a back door and allow other people to have unauthorized access to your computer over internet.

Trapdoor/Backdoor Backdoor is the most dangerous type of Trojans. Backdoor is installed and launched without the knowledge of the user of the victim computer. Backdoor functions can include: 1. Sending/ receiving files 2. Launching/ deleting files 3. Executing files 4. Deleting data

Hacking refer to unauthorized access to the computer system by a hacker. 2

3

Computer is used to steal money and information. Stealing of computers especially notebook and PDA. 4

Security measures

Plain Text encryption descryption troops heading west need more supplies. send general dubois' men to aid TIDIE MRNME REOGO SANOW RSLTP EEEDO SSSNU AHTUD BIENP GODAE PEIDE LNS Plain Text Ciphertext Plain Text cipher = secret plain = normal Plain Text

FILE MANAGEMENT DIAGNOSTIC UTILITY FILE COMPRESSION ANTIVIRUS BACKUP

is a utility program that we use to protect a computer against viruses

A firewall is a software or hardware that secures a network, shielding it from access by unauthorized users.