Computer Security The World of Cyber Crime Presentation Details This presentation will explain the purpose of bypassing security or stealing information.

Slides:



Advertisements
Similar presentations
The impact of IT Around the world By Eddie Cole. The positive social impacts of IT Social networking sites are huge now, bringing in hundreds of millions.
Advertisements

Computer security Viruses Hacking Backups
Implications and Security Issues of the Internet By Neelesh Patel.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Do you know how to keep yourself safe?
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
What have you known about cybercrime? What do you want to know about cybercrime?
Viruses.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Website on Computer Security By: Brittany Freeman.
IT Security for Users By Matthew Moody.
Staying Safe Online Keep your Information Secure.
By Frank Perez 9D Qatar Academy Quite simply, the problem is that people have been given the ability to download files such as music and software for.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
What are the risks to the data when we store all our work on computer? By Jessica Mann.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
CYBER CRIME.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
By Demi Gardiner 8P Who’s been on your computer??
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Downloads What is safe? What won’t crash your computer What is not? What will make your computer run slowly or not at all.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
All about viruses, hacking and backups By Harriet Thomas.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Computer security By Georgia. Contents b b What is a virus ? b b How to stop viruses b b What is a hacker ? b b How to prevent hackers b b What are backups,
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
What is a Virus? A virus is something that you get in any shape or form. You could receive an that has an interesting title, but not know who is.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Cyber Safety Jamie Salazar.
Computer Security By Duncan Hall.
Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.
By Frank Perez 9D Qatar Academy Quite simply, the problem is that people have been given the ability to download files such as music and software for.
Nine Elements of Digital Citizenship Isabella Freijah.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Technical Implementation: Security Risks
How to build a good reputation online
Keeping safe and private on the internet
Presentation transcript:

Computer Security The World of Cyber Crime

Presentation Details This presentation will explain the purpose of bypassing security or stealing information. This presentation will also show how it’s commonly done and how to prevent such things from happening to you.

Understanding the Topic Computer security first started with fraud by Ian Murphy in 1981, he bypassed the security of a U.S. phone company and changed the clock time, thus making millions of the customer’s bills extremely cheap. This presentation will help you to understand how to stop this and various other things from happening.

Computer Security is not just hackers or bad passwords on a computer, it can Also be the safety of the computer itself. Computers should be put on a place Where pets cannot get to or reach. Laptops on the floor like in the picture are susceptible to many things, one being the hardware inside the thinner laptops Being crushed under the weight of the animal and having to replace it, and in Extreme cases may cause you to reformat the computer, so having your data backed up on a disc is vital.

There are many companies that may not specialize in the field of Computer Security, however by realizing it as a necessity for concerned clients, it has become a big part of most internet companies. Conventions like these are too raise awareness of the possible threats and to improve their own business.

When the idea of computers being, “hacked” into came to be, the obvious thing is to provide ways to stop this. Thus came companies like Symantec who provides the most widely used anti-virus program in the world, Norton Anti-Virus. By selling this software which prevents viruses from being run or getting on your computer so things such as keyloggers or trojans can’t get on your computer without being detected, many companies prospered, even now computer security against viruses are still a major issue.

The advantages to having some sort of security on your computer is obvious. With proper security, your friends can’t just turn on your computer and view private files such as a digital diary without providing a password. Also you won’t have to reformat your computer if a virus does something like prevent it from turning on or make you unable to open and use programs by preventing it from running or even existing on your computer. There is no perfect security, any computers security can be bypassed, however having the proper security is necessary because 90% of the people who try to bypass security can’t defend against software built to prevent them from accessing your computer. Anyone who has the knowledge and skill to do so wouldn’t even bother unless you had something extremely important on your computer, as these, “Hackers” or anyone who can bypass a good security wouldn’t risk being caught for minor things.

Another advantage to having security on your computer is it relieves you mentally if you Have knowledge of how to bypass security or how easy it is. With some sort of security On your computer, you wouldn’t go paranoid on whether to download something or not to if it seems doubtful to you, but you know you have to have what it supposedly is because you know that if it is something bad, it will most likely be caught 99% of the time if you have up to date security. Having up to date security is extremely important as new forms of viruses are created almost everyday.

As good as the security is now in this day and age, it could also be a disadvantage, you may think you are too secure and end up getting a virus which hasn’t been found yet, or a hacker may bypass your security software. No matter how protected you are, if a skilled and dedicated hacker was determined to get in, he WILL get in, but if there’s proper security, he will be caught and jailed if he tries to do anything that may take longer than a few seconds.

Another disadvantage to having computer security may be that if your computer is not good enough, it may take up too much memory on your computer or slow down all other functions on the computer. So the problem is the program itself, and if there’s no way you can afford to get or can get more memory, then you’re at a disadvantage because you most likely wouldn’t want to have the security if it would cause major performance loss.

Of course, computer security will get better and better, however there will always also be new ways to bypass security. Computer security is changing and growing quickly and will lead at the same time lead to better viruses and ways to bypass security settings.

People who bypass security such as hackers get into computers by either using programs or using a security flaw against you that you have on your computer. If you have file/printer sharing on, then hackers can do a wide range search with a program for IP’s with this on, and say they want to use the printer/file folder and do other things once they’re in. To get passwords, hackers sometimes use programs that are made by hackers and try a dictionary of words until it works. These are some of the common ways it happens, there are of course more complex and efficient ways.

This graph shows the relationships of computer crimes in the year 1998, 1999, and Computer theft was generally higher in 1999.

The End!!!!