SlideShare una empresa de Scribd logo
1 de 41
Computer Security
By Shahzad Younas
Superior University Depalpur
E-Mail: shzadyounas@gmail.com
Topic : Computer Security
Group Name: Anmol
Group
Group Leader Shahzad Younas
Group Members
Ansar Sohail
Ali Shahzad
Fiaz Tabish
Objectives
Computer
Security
Computer
Security
CIA TrailCIA Trail MalwareMalware
Email Related
Issue
Email Related
Issue
Cyber VillainsCyber Villains ProtectionProtection
AuthenticationAuthentication ReferencesReferences
Computer Security
Computer security is the field
which tries to keep computer
safe and secure.
What does it mean to be secure?
• Include protection of information from
theft or corruption, or the preservation
of availability, as defined in the
security policy.
CIA Trial
It is combination of principles.
Security Objectives:
Confidentiality
Availability
Integrity
Confidentiality
• The information must just be
accessible to the authorized
people
• Confidentiality is keeping
information secret or private.
• Confidentiality might be important
for military, business or personal
reasons.
Integrity
• Integrity is the unauthorized writing or
modification of information.
• Guarantee that the data is what we
expect.
• Messages can’t be modified without
detection.
Availability
• System and networks must be up and
running.
• Availability is the prevention of
unauthorized withholding of information.
Malware
• Malware (short for malicious software)is any
software specifically designed to damage a computer
system without owner knowledge.
Examples:
Trojan Horses
Viruses
Worm
Trojan Horse
• A Trojan Horse is program that is
packaged with a useful application,
usually free, such as a screen or game
saver, but carries a destructive virus,
that creates problems for your
computer without your knowledge.
Trojan Horse
Some example of Trojan Horse
– TrojanDownloader:Win32/Zlob.gen!dll
– Trojan.Popuper.origin
– Downloader.Zlob.LI
Virus
• A computer virus is small software program
that can spread from one computer system
to another and cause interferences with
computer operations.
Worm
• A worm is a type of malicious software
(malware) that copies itself repeatedly into
a computers memory.
Email Related Issues
• Spam
• Phishing
• Pharm
• Web jack
Spam
• Spam is flooding the Internet with many copies of the
same message, in an attempt to force the message on
people who would not otherwise choose to receive it.
• It is also known as Bulk-email or Junk email
Spam
Phishing:
Example:
• You type, by mistake, “gmale.com” instead of
“gmail.com”
• gmale.com designs the site to look like
gmail.com so the user types in their info as
usual
• BAD! Now an evil person has your info!
A fake login page to be a trusted login page.
Pharm
• Software that's planted on a computer; redirects to
impostor web page even though you type in the right
URL. You can protect yourself against it by going to
websites that contain https not http.
Hacker
• Hacker is a term used by some to mean "a
clever programmer" and by others, especially
those in popular media, to mean "someone who
tries to break into computer systems.
Cracker
• A cracker also a someone who access a computer or
network illegally but has the intent of destroying data,
stealing information or other malicious action.
• Both hacker and cracker have advanced computer
and network skills.
Cyber terrorism
• Cyber terrorism can be also defined as the intentional
use of computer, networks, and public internet to cause
destruction and harm for personal objectives. Objectives
may be political or ideological since this can be seen as
a form of terrorism.
Hacker Activists
• "Hacker Activists" are people with a politically or socially
motivated purpose who break into a computer system.
"Hacker Activists" are people with a politically or socially
motivated purpose who break into a computer system.
Protection
Antivirus
Firewall
Enctyption
Antivirus
• Scans primary and secondary storage Devices.
• Detect & Destroy them.
• Keep update antivirus software.
It works in 2 ways:
1.It scans files to look for known viruses to
compare to a virus dictionary.
2. It analyzes suspicious behavior of computer
programs
Antivirus Software
• http://free.grisoft.com (AVG Antivirus Free)
• http://www.symantec.com/nav/nav_9xnt/ (Norton Antivirus)
• http://www.sophos.com/products/sav/ (Sophos Antivirus)
• http://www.pandasoftware.com/home/default.asp (Titanium Antivirus)
• http://www.trendmicro.com/en/home/us/personal.htm (Trend Micro PC-cillin)
• http://www.mcafee.com (McAfee VirusScan)
Online Antivirus Checkups
•http://housecall.trendmicro.com/
•http://www.pandasoftware.com/products/activescan.htm
Some links where we can find free antivirus software.
Firewall
• Windows Firewall (or any other firewall) can help alert
you to suspicious activity if a virus or worm attempts to
connect to your computer. It can also block viruses,
worms, and hackers from attempting to download
potentially harmful programs to your computer.
Some Firewall Software
• http://www.zonealarm.com (ZoneAlarm)
• http://www.mcafee.com (McAfee Personal Firewall)
• http://www.symantec.com/sabu/nis/npf/ (Norton Personal Firewall)
Encryption
• Turning readable data into a form of unreadable data in
order to prevent access that is not authorized Often used
in the military.
Authentication
Authentication is the process of determining
whether someone or something is, in fact,
who or what it is declared to be.
Examples:
• Password
• Biometrics
• Palm/Finger Print
Password
• A password or watchword is a form of authentication used to guard
or control a "resource"
Tips for Creating Secure Passwords
• http://www.microsoft.com/athome/security/privacy/password.mspx
• http://www.us-cert.gov/cas/tips/ST04-002.html
• http://www.symantec.com/homecomputing/library/pass_w.html
Use complex password:
Hint: iMnew145
Biometrics
• Biometrics is the science of measuring of human
physical or behavioral characteristics.
Palm/Finger Print
• Palm/Finger print scanning is a unique way to protect
your privacy. You run your finger across a window or
sensor to identify yourself.
Iris/Face
• Iris/ face scans are very reliable identifiers. Each individual person
has different eyes and face shape, making this type of scan very
effective.
Voice
• A systems that extract features from speech patterns in
order to recognize someone's voice which is then
digitalized and stored
References
• (http://www.pcworld.com/article/id,144017-
c,internetlegalissues/article.htm)
• (http://en.wikipedia.org/wiki/Firewall_(networking))
• http://www.questbiometrics.com
• http://www.nationalbiometric.org/
• http://www.news.com/2100-1001-205144.html
Computer security and malware by shahzad younas

Más contenido relacionado

La actualidad más candente

Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typeshamza javed
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...nexxtep
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Michael Asres
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Hacking and privacy threats
Hacking and privacy threatsHacking and privacy threats
Hacking and privacy threatsBahaarAbdullah
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 
Security Awareness And Hacking
Security Awareness And HackingSecurity Awareness And Hacking
Security Awareness And Hackingritik shukla
 
Mohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersMohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersGoldenPartsAE101
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 

La actualidad más candente (20)

Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Hacking and privacy threats
Hacking and privacy threatsHacking and privacy threats
Hacking and privacy threats
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Security Awareness And Hacking
Security Awareness And HackingSecurity Awareness And Hacking
Security Awareness And Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Mohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersMohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And Hackers
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 

Destacado

Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Destacado (12)

Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
cyber_security
cyber_securitycyber_security
cyber_security
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Security threats
Security threatsSecurity threats
Security threats
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar a Computer security and malware by shahzad younas

Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 

Similar a Computer security and malware by shahzad younas (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Information security
Information securityInformation security
Information security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Computer security
Computer securityComputer security
Computer security
 

Último

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Último (20)

LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Computer security and malware by shahzad younas

  • 1. Computer Security By Shahzad Younas Superior University Depalpur E-Mail: shzadyounas@gmail.com
  • 2.
  • 3. Topic : Computer Security Group Name: Anmol Group Group Leader Shahzad Younas Group Members Ansar Sohail Ali Shahzad Fiaz Tabish
  • 4. Objectives Computer Security Computer Security CIA TrailCIA Trail MalwareMalware Email Related Issue Email Related Issue Cyber VillainsCyber Villains ProtectionProtection AuthenticationAuthentication ReferencesReferences
  • 5. Computer Security Computer security is the field which tries to keep computer safe and secure.
  • 6. What does it mean to be secure? • Include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy.
  • 7. CIA Trial It is combination of principles. Security Objectives: Confidentiality Availability Integrity
  • 8. Confidentiality • The information must just be accessible to the authorized people • Confidentiality is keeping information secret or private. • Confidentiality might be important for military, business or personal reasons.
  • 9. Integrity • Integrity is the unauthorized writing or modification of information. • Guarantee that the data is what we expect. • Messages can’t be modified without detection.
  • 10. Availability • System and networks must be up and running. • Availability is the prevention of unauthorized withholding of information.
  • 11. Malware • Malware (short for malicious software)is any software specifically designed to damage a computer system without owner knowledge. Examples: Trojan Horses Viruses Worm
  • 12. Trojan Horse • A Trojan Horse is program that is packaged with a useful application, usually free, such as a screen or game saver, but carries a destructive virus, that creates problems for your computer without your knowledge.
  • 14. Some example of Trojan Horse – TrojanDownloader:Win32/Zlob.gen!dll – Trojan.Popuper.origin – Downloader.Zlob.LI
  • 15. Virus • A computer virus is small software program that can spread from one computer system to another and cause interferences with computer operations.
  • 16. Worm • A worm is a type of malicious software (malware) that copies itself repeatedly into a computers memory.
  • 17. Email Related Issues • Spam • Phishing • Pharm • Web jack
  • 18. Spam • Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. • It is also known as Bulk-email or Junk email
  • 19. Spam
  • 20. Phishing: Example: • You type, by mistake, “gmale.com” instead of “gmail.com” • gmale.com designs the site to look like gmail.com so the user types in their info as usual • BAD! Now an evil person has your info! A fake login page to be a trusted login page.
  • 21.
  • 22. Pharm • Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http.
  • 23.
  • 24. Hacker • Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems.
  • 25. Cracker • A cracker also a someone who access a computer or network illegally but has the intent of destroying data, stealing information or other malicious action. • Both hacker and cracker have advanced computer and network skills.
  • 26. Cyber terrorism • Cyber terrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives. Objectives may be political or ideological since this can be seen as a form of terrorism.
  • 27. Hacker Activists • "Hacker Activists" are people with a politically or socially motivated purpose who break into a computer system. "Hacker Activists" are people with a politically or socially motivated purpose who break into a computer system.
  • 29. Antivirus • Scans primary and secondary storage Devices. • Detect & Destroy them. • Keep update antivirus software. It works in 2 ways: 1.It scans files to look for known viruses to compare to a virus dictionary. 2. It analyzes suspicious behavior of computer programs
  • 30. Antivirus Software • http://free.grisoft.com (AVG Antivirus Free) • http://www.symantec.com/nav/nav_9xnt/ (Norton Antivirus) • http://www.sophos.com/products/sav/ (Sophos Antivirus) • http://www.pandasoftware.com/home/default.asp (Titanium Antivirus) • http://www.trendmicro.com/en/home/us/personal.htm (Trend Micro PC-cillin) • http://www.mcafee.com (McAfee VirusScan) Online Antivirus Checkups •http://housecall.trendmicro.com/ •http://www.pandasoftware.com/products/activescan.htm Some links where we can find free antivirus software.
  • 31. Firewall • Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus or worm attempts to connect to your computer. It can also block viruses, worms, and hackers from attempting to download potentially harmful programs to your computer.
  • 32. Some Firewall Software • http://www.zonealarm.com (ZoneAlarm) • http://www.mcafee.com (McAfee Personal Firewall) • http://www.symantec.com/sabu/nis/npf/ (Norton Personal Firewall)
  • 33. Encryption • Turning readable data into a form of unreadable data in order to prevent access that is not authorized Often used in the military.
  • 34. Authentication Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. Examples: • Password • Biometrics • Palm/Finger Print
  • 35. Password • A password or watchword is a form of authentication used to guard or control a "resource" Tips for Creating Secure Passwords • http://www.microsoft.com/athome/security/privacy/password.mspx • http://www.us-cert.gov/cas/tips/ST04-002.html • http://www.symantec.com/homecomputing/library/pass_w.html Use complex password: Hint: iMnew145
  • 36. Biometrics • Biometrics is the science of measuring of human physical or behavioral characteristics.
  • 37. Palm/Finger Print • Palm/Finger print scanning is a unique way to protect your privacy. You run your finger across a window or sensor to identify yourself.
  • 38. Iris/Face • Iris/ face scans are very reliable identifiers. Each individual person has different eyes and face shape, making this type of scan very effective.
  • 39. Voice • A systems that extract features from speech patterns in order to recognize someone's voice which is then digitalized and stored
  • 40. References • (http://www.pcworld.com/article/id,144017- c,internetlegalissues/article.htm) • (http://en.wikipedia.org/wiki/Firewall_(networking)) • http://www.questbiometrics.com • http://www.nationalbiometric.org/ • http://www.news.com/2100-1001-205144.html