Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.

Slides:



Advertisements
Similar presentations
Primary Threats to Computer Security
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Tech. What is an unsolicited message sent to many recipients Adware Spam Spyware Phishing here here Want to know how spam really.
SPYWARE Presented by The State Security Office November 17, 2004.
And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.
Computer Viruses.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
The Internet = A World of Opportunities
Threats To A Computer Network
Quiz Review.
Security Advice Georgie Pepper Campsmount Acadamy.
How It Applies In A Virtual World
Chapter Nine Maintaining a Computer Part III: Malware.
Threats to I.T Internet security By Cameron Mundy.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Internet safety By Lydia Snowden.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Online Annoyances Spam – electronic junk mail
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 19 INTERNET SECURITY
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
ADWARE By kristelle. What is Adware? Is an annoying and intrusive software, that automatically displays advertisements on your computer while a program.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
THIS powerPOINT Is ABOUT virus’s AND OTHER Harmful RISKS.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
1.Introduction 2.Types of Software 2.1.System software 2.2.Application software 3.Security of a system 3.1.Basic Components of Computer 3.2.Threats to.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Software Concepts.
Managing Windows Security
Instructor Materials Chapter 7 Network Security
Lesson 3 Safe Computing.
Lecture 5. Security Threats
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
امنیت اطلاعات و ضرورت آن
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
Networking for Home and Small Businesses – Chapter 8
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.

Components of Security System  Confidentiality  Integrity  Authentication

Components of Security System  Access Control  Non - repudiation  Availability  Privacy

Threats to Computer Security A threat is a potential violation of security.

Computer Viruses Worms Trojan Horses

Viruses can do the following if unchecked Damage or delete files Slow down the computer Invade your program

Spyware Compromises your data Alters PC Setting Slow down computer

Adware Track yore information just like spyware Display arrays of annoying advertisements Slow down computer

Spamming Spam reduces productivity Spasm eats up your time Spam can lead to worse things

PC Intrusion Sweeper Attack Denial of Services Password Guessing

Phishing It is the criminally fraudulent process of attempting to acquire sensitive information such passwords, credit card details etc.

Solutions to Security Threats Active Protection Preventive Measures

Active Protection Use Anti – Virus and Anti Spyware software Download updates regularly Run frequent system scans

Preventive Measures Keep your system up to date Use caution when downloading files Be careful with s Disable cookies, if possible