SlideShare una empresa de Scribd logo
1 de 41
Computer Security
By Shahzad Younas
Superior University Depalpur
E-Mail: shzadyounas@gmail.com
Topic : Computer Security
Group Name: Anmol
Group
Group Leader Shahzad Younas
Group Members
Ansar Sohail
Ali Shahzad
Fiaz Tabish
Objectives
Computer
Security
Computer
Security
CIA TrailCIA Trail MalwareMalware
Email Related
Issue
Email Related
Issue
Cyber VillainsCyber Villains ProtectionProtection
AuthenticationAuthentication ReferencesReferences
Computer Security
Computer security is the field
which tries to keep computer
safe and secure.
What does it mean to be secure?
• Include protection of information from
theft or corruption, or the preservation
of availability, as defined in the
security policy.
CIA Trial
It is combination of principles.
Security Objectives:
Confidentiality
Availability
Integrity
Confidentiality
• The information must just be
accessible to the authorized
people
• Confidentiality is keeping
information secret or private.
• Confidentiality might be important
for military, business or personal
reasons.
Integrity
• Integrity is the unauthorized writing or
modification of information.
• Guarantee that the data is what we
expect.
• Messages can’t be modified without
detection.
Availability
• System and networks must be up and
running.
• Availability is the prevention of
unauthorized withholding of information.
Malware
• Malware (short for malicious software)is any
software specifically designed to damage a computer
system without owner knowledge.
Examples:
Trojan Horses
Viruses
Worm
Trojan Horse
• A Trojan Horse is program that is
packaged with a useful application,
usually free, such as a screen or game
saver, but carries a destructive virus,
that creates problems for your
computer without your knowledge.
Trojan Horse
Some example of Trojan Horse
– TrojanDownloader:Win32/Zlob.gen!dll
– Trojan.Popuper.origin
– Downloader.Zlob.LI
Virus
• A computer virus is small software program
that can spread from one computer system
to another and cause interferences with
computer operations.
Worm
• A worm is a type of malicious software
(malware) that copies itself repeatedly into
a computers memory.
Email Related Issues
• Spam
• Phishing
• Pharm
• Web jack
Spam
• Spam is flooding the Internet with many copies of the
same message, in an attempt to force the message on
people who would not otherwise choose to receive it.
• It is also known as Bulk-email or Junk email
Spam
Phishing:
Example:
• You type, by mistake, “gmale.com” instead of
“gmail.com”
• gmale.com designs the site to look like
gmail.com so the user types in their info as
usual
• BAD! Now an evil person has your info!
A fake login page to be a trusted login page.
Pharm
• Software that's planted on a computer; redirects to
impostor web page even though you type in the right
URL. You can protect yourself against it by going to
websites that contain https not http.
Hacker
• Hacker is a term used by some to mean "a
clever programmer" and by others, especially
those in popular media, to mean "someone who
tries to break into computer systems.
Cracker
• A cracker also a someone who access a computer or
network illegally but has the intent of destroying data,
stealing information or other malicious action.
• Both hacker and cracker have advanced computer
and network skills.
Cyber terrorism
• Cyber terrorism can be also defined as the intentional
use of computer, networks, and public internet to cause
destruction and harm for personal objectives. Objectives
may be political or ideological since this can be seen as
a form of terrorism.
Hacker Activists
• "Hacker Activists" are people with a politically or socially
motivated purpose who break into a computer system.
"Hacker Activists" are people with a politically or socially
motivated purpose who break into a computer system.
Protection
Antivirus
Firewall
Enctyption
Antivirus
• Scans primary and secondary storage Devices.
• Detect & Destroy them.
• Keep update antivirus software.
It works in 2 ways:
1.It scans files to look for known viruses to
compare to a virus dictionary.
2. It analyzes suspicious behavior of computer
programs
Antivirus Software
• http://free.grisoft.com (AVG Antivirus Free)
• http://www.symantec.com/nav/nav_9xnt/ (Norton Antivirus)
• http://www.sophos.com/products/sav/ (Sophos Antivirus)
• http://www.pandasoftware.com/home/default.asp (Titanium Antivirus)
• http://www.trendmicro.com/en/home/us/personal.htm (Trend Micro PC-cillin)
• http://www.mcafee.com (McAfee VirusScan)
Online Antivirus Checkups
•http://housecall.trendmicro.com/
•http://www.pandasoftware.com/products/activescan.htm
Some links where we can find free antivirus software.
Firewall
• Windows Firewall (or any other firewall) can help alert
you to suspicious activity if a virus or worm attempts to
connect to your computer. It can also block viruses,
worms, and hackers from attempting to download
potentially harmful programs to your computer.
Some Firewall Software
• http://www.zonealarm.com (ZoneAlarm)
• http://www.mcafee.com (McAfee Personal Firewall)
• http://www.symantec.com/sabu/nis/npf/ (Norton Personal Firewall)
Encryption
• Turning readable data into a form of unreadable data in
order to prevent access that is not authorized Often used
in the military.
Authentication
Authentication is the process of determining
whether someone or something is, in fact,
who or what it is declared to be.
Examples:
• Password
• Biometrics
• Palm/Finger Print
Password
• A password or watchword is a form of authentication used to guard
or control a "resource"
Tips for Creating Secure Passwords
• http://www.microsoft.com/athome/security/privacy/password.mspx
• http://www.us-cert.gov/cas/tips/ST04-002.html
• http://www.symantec.com/homecomputing/library/pass_w.html
Use complex password:
Hint: iMnew145
Biometrics
• Biometrics is the science of measuring of human
physical or behavioral characteristics.
Palm/Finger Print
• Palm/Finger print scanning is a unique way to protect
your privacy. You run your finger across a window or
sensor to identify yourself.
Iris/Face
• Iris/ face scans are very reliable identifiers. Each individual person
has different eyes and face shape, making this type of scan very
effective.
Voice
• A systems that extract features from speech patterns in
order to recognize someone's voice which is then
digitalized and stored
References
• (http://www.pcworld.com/article/id,144017-
c,internetlegalissues/article.htm)
• (http://en.wikipedia.org/wiki/Firewall_(networking))
• http://www.questbiometrics.com
• http://www.nationalbiometric.org/
• http://www.news.com/2100-1001-205144.html
Computer security and malware by shahzad younas

Más contenido relacionado

La actualidad más candente

Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typeshamza javed
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...nexxtep
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Michael Asres
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Hacking and privacy threats
Hacking and privacy threatsHacking and privacy threats
Hacking and privacy threatsBahaarAbdullah
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 
Security Awareness And Hacking
Security Awareness And HackingSecurity Awareness And Hacking
Security Awareness And Hackingritik shukla
 
Mohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersMohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersGoldenPartsAE101
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 

La actualidad más candente (20)

Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Hacking and privacy threats
Hacking and privacy threatsHacking and privacy threats
Hacking and privacy threats
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Security Awareness And Hacking
Security Awareness And HackingSecurity Awareness And Hacking
Security Awareness And Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Mohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersMohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And Hackers
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 

Destacado

Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Destacado (12)

Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
cyber_security
cyber_securitycyber_security
cyber_security
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Security threats
Security threatsSecurity threats
Security threats
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar a Computer security and malware by shahzad younas

Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 

Similar a Computer security and malware by shahzad younas (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Information security
Information securityInformation security
Information security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Computer security
Computer securityComputer security
Computer security
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 

Último (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 

Computer security and malware by shahzad younas

  • 1. Computer Security By Shahzad Younas Superior University Depalpur E-Mail: shzadyounas@gmail.com
  • 2.
  • 3. Topic : Computer Security Group Name: Anmol Group Group Leader Shahzad Younas Group Members Ansar Sohail Ali Shahzad Fiaz Tabish
  • 4. Objectives Computer Security Computer Security CIA TrailCIA Trail MalwareMalware Email Related Issue Email Related Issue Cyber VillainsCyber Villains ProtectionProtection AuthenticationAuthentication ReferencesReferences
  • 5. Computer Security Computer security is the field which tries to keep computer safe and secure.
  • 6. What does it mean to be secure? • Include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy.
  • 7. CIA Trial It is combination of principles. Security Objectives: Confidentiality Availability Integrity
  • 8. Confidentiality • The information must just be accessible to the authorized people • Confidentiality is keeping information secret or private. • Confidentiality might be important for military, business or personal reasons.
  • 9. Integrity • Integrity is the unauthorized writing or modification of information. • Guarantee that the data is what we expect. • Messages can’t be modified without detection.
  • 10. Availability • System and networks must be up and running. • Availability is the prevention of unauthorized withholding of information.
  • 11. Malware • Malware (short for malicious software)is any software specifically designed to damage a computer system without owner knowledge. Examples: Trojan Horses Viruses Worm
  • 12. Trojan Horse • A Trojan Horse is program that is packaged with a useful application, usually free, such as a screen or game saver, but carries a destructive virus, that creates problems for your computer without your knowledge.
  • 14. Some example of Trojan Horse – TrojanDownloader:Win32/Zlob.gen!dll – Trojan.Popuper.origin – Downloader.Zlob.LI
  • 15. Virus • A computer virus is small software program that can spread from one computer system to another and cause interferences with computer operations.
  • 16. Worm • A worm is a type of malicious software (malware) that copies itself repeatedly into a computers memory.
  • 17. Email Related Issues • Spam • Phishing • Pharm • Web jack
  • 18. Spam • Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. • It is also known as Bulk-email or Junk email
  • 19. Spam
  • 20. Phishing: Example: • You type, by mistake, “gmale.com” instead of “gmail.com” • gmale.com designs the site to look like gmail.com so the user types in their info as usual • BAD! Now an evil person has your info! A fake login page to be a trusted login page.
  • 21.
  • 22. Pharm • Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http.
  • 23.
  • 24. Hacker • Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems.
  • 25. Cracker • A cracker also a someone who access a computer or network illegally but has the intent of destroying data, stealing information or other malicious action. • Both hacker and cracker have advanced computer and network skills.
  • 26. Cyber terrorism • Cyber terrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives. Objectives may be political or ideological since this can be seen as a form of terrorism.
  • 27. Hacker Activists • "Hacker Activists" are people with a politically or socially motivated purpose who break into a computer system. "Hacker Activists" are people with a politically or socially motivated purpose who break into a computer system.
  • 29. Antivirus • Scans primary and secondary storage Devices. • Detect & Destroy them. • Keep update antivirus software. It works in 2 ways: 1.It scans files to look for known viruses to compare to a virus dictionary. 2. It analyzes suspicious behavior of computer programs
  • 30. Antivirus Software • http://free.grisoft.com (AVG Antivirus Free) • http://www.symantec.com/nav/nav_9xnt/ (Norton Antivirus) • http://www.sophos.com/products/sav/ (Sophos Antivirus) • http://www.pandasoftware.com/home/default.asp (Titanium Antivirus) • http://www.trendmicro.com/en/home/us/personal.htm (Trend Micro PC-cillin) • http://www.mcafee.com (McAfee VirusScan) Online Antivirus Checkups •http://housecall.trendmicro.com/ •http://www.pandasoftware.com/products/activescan.htm Some links where we can find free antivirus software.
  • 31. Firewall • Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus or worm attempts to connect to your computer. It can also block viruses, worms, and hackers from attempting to download potentially harmful programs to your computer.
  • 32. Some Firewall Software • http://www.zonealarm.com (ZoneAlarm) • http://www.mcafee.com (McAfee Personal Firewall) • http://www.symantec.com/sabu/nis/npf/ (Norton Personal Firewall)
  • 33. Encryption • Turning readable data into a form of unreadable data in order to prevent access that is not authorized Often used in the military.
  • 34. Authentication Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. Examples: • Password • Biometrics • Palm/Finger Print
  • 35. Password • A password or watchword is a form of authentication used to guard or control a "resource" Tips for Creating Secure Passwords • http://www.microsoft.com/athome/security/privacy/password.mspx • http://www.us-cert.gov/cas/tips/ST04-002.html • http://www.symantec.com/homecomputing/library/pass_w.html Use complex password: Hint: iMnew145
  • 36. Biometrics • Biometrics is the science of measuring of human physical or behavioral characteristics.
  • 37. Palm/Finger Print • Palm/Finger print scanning is a unique way to protect your privacy. You run your finger across a window or sensor to identify yourself.
  • 38. Iris/Face • Iris/ face scans are very reliable identifiers. Each individual person has different eyes and face shape, making this type of scan very effective.
  • 39. Voice • A systems that extract features from speech patterns in order to recognize someone's voice which is then digitalized and stored
  • 40. References • (http://www.pcworld.com/article/id,144017- c,internetlegalissues/article.htm) • (http://en.wikipedia.org/wiki/Firewall_(networking)) • http://www.questbiometrics.com • http://www.nationalbiometric.org/ • http://www.news.com/2100-1001-205144.html