Isra University Faculty of IT 1. Before we start... Please turn off your mobile phone 2.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Physical Security Logical/Computer Security What other examples?
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Lecturer: Fadwa Tlaelan
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Unit 18 Data Security 1.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Security & Safety
س : ما هو فيروس الكمبيوتر ؟
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Security Issues and Ethics in Education
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
For more notes and topics visit: eITnotes.com.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
COMPUTER VIRUS.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Security and Ethics Safeguards and Codes of Conduct.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics.
BCT 2.00 Analyze Technology Issues
UNIT 18 Data Security 1.
Technology Mrs. Huddleston
Presentation transcript:

Isra University Faculty of IT 1

Before we start... Please turn off your mobile phone 2

Chapter 7 Computer Security Threats Contents: Introduction Computer Security Threats Computer viruses Unauthorized access and use of computer systems Software Theft Information theft and information privacy 3

Introduction مقدمة Next Some breaches to computer security are accidental, but some are planned بعض انتهاكات أمن الكمبيوتر هي عرضية (غير مقصودة)، لكن البعض الاخر يتم التخطيط لها computer crime Any illegal act involving a computer is generally referred to as a computer crime أي عمل غير قانوني يؤثر على الكمبيوتر يشار إليه بجريمة كمبيوتر ‌Cybercrime ‌Cybercrime refers to online or Internet-based illegal acts Cybercrime Cybercrime تشير إلى الأعمال غير المشروعة (غير القانونية) عبر الإنترنت أو على شبكة الإنترنت

Computer Security Threats What is a computer security threat ? Next  is any event or action that could cause a loss or damage to computer hardware, software, data, or information. تهديد امن الكمبيوتر: هو أي حدث أو عمل من شأنه أن يؤدي إلى فقدان أو تلف أجهزة الكمبيوتر، البرمجيات، البيانات أو المعلومات.

Computer Security Threats Some of the more common computer security risks include بعض المخاطر الأمنية للكمبيوتر الأكثر شيوعا تشمل Next Computer viruses Unauthorized access and use of computer systems Software theft Information theft and information privacy فيروسات الكمبيوتر الوصول غير المصرح (المرخص) به واستخدام أنظمة الكمبيوتر سرقة البرامج سرقة المعلومات وخصوصية المعلومات

Computer viruses Virus: Virus: A program or a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data Next الفيروس الفيروس هو برنامج او قطعة من التعليمات البرمجية القادرة على نسخ نفسها، ولها تأثير ضار، مثل إفساد النظام أو تدمير البيانات

Computer viruses Types of viruses Next boot sector virus A boot sector virus executes when a computer starts up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk boot sector virus يعمل عندما يتم تشغيل الكمبيوتر، ويكون موجود في مقطع الاستنهاض في القرص المرن أو القرص الصلب file virus A file virus attaches itself to program files, and is loaded into memory when the infected program is run file virus تعلق نفسها بملفات قابلة للتنفيذ، ويتم تحميل الفيروس في ذاكرة الكمبيوتر عندما ينفذ الملف (البرنامج) المصاب Macro virus Macro virus infects a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started. A macro virus is often spread as an virus Macro virus Macro virus يصيب Microsoft Word أو التطبيقات المماثلة ويسبب بتنفيذ سلسلة من الاوامر تلقائيا وذلك عند بدء تشغيل التطبيق. وغالبا ما ينتشر هذا النوع عن طريق البريد الإلكتروني

Computer viruses Types of viruses Next Time Bombs It makes the damage at a specific time Time Bombs تحدث الضررَ في وقت معيّن worm A worm copies itself repeatedly in memory or on a disk drive until no memory or disk space remains, which makes the computer stops workingWorm تنسخ نفسها مرارا (تكرر نفسها) في الذاكرة أو على القرص الصلب حتى تمتلىء الذاكرة أو القرص، الأمر الذي يؤدي الى توقف عمل الكمبيوتر Trojan horse A Trojan horse is a program that hides within or looks like a legitimate program, but executes when a certain condition or action is triggered Trojan horse يخفي نفسه داخل برنامج أو يظهر نفسه كأنه برنامج مشروع، ويبدأ العمل عندما يتحقق شرط ما او عندما ينفذ إجراء معين

Computer viruses An infected computer has one or more of the following symptoms لدى جهاز الكمبيوتر المصاب واحدة أو أكثر من الأعراض التالية 10 Operating system runs much slower than usual نظام التشغيل يعمل ابطأ من المعتاد Available memory is less than expected حجم الذاكرة المتاحة اقل من المتوقع Files become corrupted الملفات تصبح معطلة Screen displays unusual message or image الشاشة تظهر رسائل او صور غير متوقعة Music or unusual sound plays randomly تشغيل موسيقى او اصوات غريبة بشكل عشوائي Existing programs and files disappear برامج وملفات موجودة تختفي Programs or files do not work properly برامج او ملفات لا تعمل بشكل طبيعي Unknown programs or files mysteriously appear برامج او ملفات غير معروفة تظهر System properties change خصائص النظام تتغير Operating system does not start up نظام التشغيل يصبح غير قادر على استنهاض الجهاز Operating system shuts down unexpectedly نظام التشغيل ينهي عمل الجهاز فجأة

Computer viruses How can a virus spread through an message? Next Step 1. Unscrupulous programmers create a virus program. They hide the virus in a Word document and attach the Word document to an message. Step 2. They use the Internet to send the message to thousands of users around the world. Step 3b. Other users do not recognize the name of the sender of the message. These users do not open the message -- instead they immediately delete the message. These users’ computers are not infected with the virus. Step 3a. Some users open the attachment and their computers become infected with the virus.

Computer viruses Precautions to prevent virus infection الاحتياطات اللازمة لمنع عدوى الفيروس Next Ensure that the is from a trusted source before opening or executing any attachment. Install an antivirus utility and update its virus definitions frequently for detecting and removing viruses. Never start up a computer with a floppy disk in the floppy drive. Scan all floppy disks and files for possible virus infection before opening them. Back up important files regularly. قبل فتح أو تنفيذ أي مرفق للبريد الإلكتروني ( attachment) يجب التأكد من أن البريد الإلكتروني هو من مصدر موثوق. تثبيت برنامج مكافحة الفيروسات وتحديث تعريفات الفيروسات لكشف وإزالة الفيروسات. لا تبدأ تشغيل الكمبيوتر والقرص المرن موجود في محرك الأقراص المرنة. تفحص كافة الأقراص المرنة والملفات لاحتمال الاصابة بعدوى الفيروس قبل فتحها. عمل نسخة احتياطية من الملفات الهامة بشكل منتظم.

Unauthorized access and use of computer systems Next Unauthorized access Unauthorized access is the use of a computer or network without permission Unauthorized access (الدخول غير المصرح به) هو استخدام جهاز الكمبيوتر أو الشبكة دون إذن Unauthorized use Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities Unauthorized use (الاستخدام غير المصرح به) هو استخدام جهاز الكمبيوتر أو البيانات في انشطة غير موافق عليها أو غير قانونية A hacker, is someone who tries to access a computer or network illegally Someone gaining access to a bank computer and performing an unauthorized transfer

Software Theft Two common forms of software theft are Next Software piracy: A term used to describe the act of illegally using, copying or distributing software without purchasing the software or having the legal rights. The majority of software purchased today is purchased as a one-site license, meaning that only one computer may have that software installed on it at one time. Copying that software to multiple computers or sharing it with your friend without multiple licenses is considered illegal and is considered software piracy. قرصنة البرمجيات: مصطلح يستخدم لوصف اي فعل غير قانوني مثل: استخدام، نسخ أو توزيع البرامج دون شرائها أو دون امتلاك الحقوق القانونية. اليوم غالبية البرمجيات يتم شراؤها برخصة لشخص واحد ( one- site license ) ، وهذا يعني أن جهاز كمبيوتر واحد سيستخدم البرنامج في وقت واحد. نسخ هذا البرنامج على أجهزة كمبيوتر متعددة أو مشاركة صديقك دون دون الحصول على تراخيص متعددة يعتبر غير قانوني. Physically stealing media (e.g., floppy disk, CD-ROM or USB flash) that contains software. السرقة الحسية لوسائل (وسائط) التخزين على سبيل المثال: Floppy disk CD-ROM USB flash الذي يحتوي على البرمجيات

Information theft and information privacy Information theft refers to someone steals personal or confidential information from others سرقة المعلومات هي قيام شخص بسرقة معلومات شخصية أو سرية من الآخرين Next  A company wants to learn about a competitor  An individual steals credit card numbers to make fraudulent purchases Reasons for information theft include أسباب سرقة المعلومات تشمل  شركة تريد أن تعرف عن منافسيها  فرد يسرق أرقام بطاقات الائتمان ليحتال في عمليات الشراء Information privacy refers to the right of individuals or organizations to deny or restrict the collection and use of information about them خصوصية المعلومات هي حق الأفراد أو المنظمات بمنع أو تقييد جمع واستخدام المعلومات الخاصة بهم

Good luck