Presentation is loading. Please wait.

Presentation is loading. Please wait.

Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek

Similar presentations


Presentation on theme: "Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek"— Presentation transcript:

1 Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Computer Security Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek Hello; Thank you Overview of computer security and good computing practices. This is kind-of a whirlwind overview, so the handout that you have has additional information and details about any of the things that I will be talking about.

2 Outline Definition of Computer Security
Why should I care about computer security? Who would want to break into your computer at home? The difference between hackers and crackers What can an attacker do to your computer? Types of Attacks What features should a computer security system provide? Understanding security and safer computing What is ethics? Common Ethical Issues for IT Users The general topics I will be covering are <Read Topics> My expectation is that much of what I cover will be familiar to you, and that’s a good thing. One goal of computer security training is to reinforce and confirm and update good computing practices that people already know about, so they remain in the front of your mind. And then hopefully through the course of this overview there will be a couple of gems or new things that you can take away, as well.

3 Definition of Computer Security
Computer security is the process of preventing and detecting unauthorized use of your computer.

4 Isn’t this just an IT Problem?
<Read slide> And the answer is: Well, not really…

5 Why should I care about computer security?
Protects the information in your computer starting from your system files, personal files, backup files up to your temporary files. Protect fundamental information while still allowing access to those who need it Trade secrets, medical records, etc. Provide authentication and access control for resources. Guarantee availability of resources.

6 What we have seen so far? Authentication Access control Encryption

7 Who would want to break into your computer at home?
Intruders (also referred to as hackers, attackers, or crackers) may not care about your identity. Often they want to gain control of your computer so they can use it to launch attacks on other computer systems.

8 The difference between hackers and crackers
Hackers- Are people who gain unauthorized access to computer system for the fun and challenge of it Crackers - Is someone who breaks into computers, often to do something hateful such as steal credit card information

9 What can an attacker do to your computer?
a) Hide programs that launch attacks b) Generate large volumes of unwanted traffic, slowing down the entire system c) Distribute illegal software from your computer d) Access controlled information (e.g. identity theft) e) Record all of your keystrokes and get your passwords

10 Types of Attacks Security events can take many forms, but one of the most frequent is an attack on a networked computer from outside source. Most attacks involve: Viruses Worms Trojan Horses

11 What features should a computer security system provide?
Confidentiality The prevention of unauthorized disclosure of information. Confidentiality is keeping information secret or private. Confidentiality might be important for military, business or personal reasons. Integrity Integrity is the unauthorized writing or modification of information. Integrity means that there is an external consistency in the system - everything is as it is expected to be. Data integrity means that the data stored on a computer is the same as the source documents. Availability Information should be accessible and useable upon appropriate demand by an authorized user. Availability is the prevention of unauthorized withholding of information. Denial of service attacks are a common form of attack.

12 Understanding security and safer computing
These are ways to help protect your computer against potential security threats: Firewall. A firewall can help protect your computer by preventing hackers or malicious software from gaining access to it. Virus protection. Antivirus software can help protect your computer against viruses, worms, and other security threats. Spyware and other malware protection. Antispyware software can help protect your computer from spyware and other potentially unwanted software. Windows Update. Windows can routinely check for updates for your computer and install them automatically.

13 How a firewall work

14 Instructions for safely using e‑mail and the web
Use care when opening e‑mail attachments. Guard your personal information carefully. Be careful when clicking hyperlinks in e‑mail messages.

15 What is ethics? Ethics is concerned with what is good for individuals and society and is also described as moral philosophy.

16 Common Ethical Issues for IT Users
Inappropriate Sharing of Information Organizations stored huge amount of information that can be classified as private or confidential. Private data describes individual employees (for example, salary, attendance, performance rating, health record). Confidential information describes a company and its operations: sales, promotion plans, research and development.

17 Cont :Common Ethical Issues for IT Users
Supporting The Ethical Practices of IT Users Companies must develop, communicate and implement written guidelines that encourage employees to respect business IT resources and use them to enhance their job performance.

18 Cont: Common Ethical Issues for IT Users
Establishing Guidelines for Use of Company Software Company IT managers must provide clear rules that rule the use of home computers and associated software. The goal should be to ensure that employees have legal copies of all software

19 Cont: Common Ethical Issues for IT Users
Structuring Information Systems to Protect Data and Information Employees should be illegal from accessing the data about research and development results.

20 Cont: Common Ethical Issues for IT Users
Installing and Maintaining a Corporate Firewall Firewall is a software or hardware device that serves as a barrier between a company and the outside world and limits access to the company’s network based on the Internet usage policy.


Download ppt "Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek"

Similar presentations


Ads by Google