SlideShare una empresa de Scribd logo
1 de 24
Ekta Vaswani
Assistant Professor,
CDAC, M.Sc.IT
 Computer Security is the protection of
computing systems and the data that they store
or access.
 Computer security, also known as cyber
security or IT security, is the protection
of computer systems from the theft or damage
to their hardware, software or information.
Confidentiality
 Confidentiality is the concealment of information
or resources.
Integrity
 Integrity is the trustworthiness of data in the
systems or resources by the point of view of
preventing unauthorized and improper changes.
Availability
 Availability refers to the ability to access data of
a resource when it is needed, as such the
information has value only if the authorized
people can access at right time.
 Unauthorized access − An unauthorized access is
when someone gains access to a server, website, or
other sensitive data using someone else's account
details.
 Hacker − Is a Person who tries and exploits a
computer system for a reason which can be money, a
social cause, fun etc.
 Threat − Is an action or event that might
compromise the security.
 Vulnerability − It is a weakness, a design problem or
implementation error in a system that can lead to an
unexpected and undesirable event regarding security
system.
 Attack − Is an assault on the system security that is
delivered by a person or a machine to a system. It
violates security.
 Antivirus or Antimalware − Is a software that
operates on different OS which is used to prevent
from malicious software.
 Social Engineering − Is a technique that a hacker
uses to steal data from a person for different
purposes by psychological manipulation
combined with social scenes.
 Virus − It is a malicious software that installs on
your computer without your consent for a bad
purpose.
 Firewall − It is a software or hardware which is
used to filter network traffic based on rules.
 Hacking means using computers to commit
fraudulent acts such as fraud, privacy invasion,
stealing corporate/personal data, etc.
 A Hacker is a person who finds and exploits the
weakness in computer systems and/or networks
to gain access. Hackers are usually skilled
computer programmers with knowledge of
computer security.
Identifying weakness in computer systems and/or
computer networks and coming with
countermeasures that protect the weaknesses.
Ethical hackers must abide by the following rules.
 Get written permission from the owner of the
computer system and/or computer network before
hacking.
 Protect the privacy of the organization been hacked.
 Transparently report all the identified weaknesses in
the computer system to the organization.
 Inform hardware and software vendors of
the identified weaknesses.
 Cyber crime is the use of computers and
networks to perform illegal activities such as
spreading computer viruses, online bullying,
performing unauthorized electronic fund
transfers, etc.
 Most cybercrimes are committed through the
internet.
 Some cybercrimes can also be carried out
using Mobile phones via SMS and online chatting
applications.
Types of Cybercrime
 Privacy violation: Exposing personal information such as email
addresses, phone number, account details, etc. on social media,
websites, etc.
 Identity Theft: Stealing personal information from somebody and
impersonating that person.
 Sharing copyrighted files/information: This involves distributing
copyright protected files such as eBooks and computer programs
etc.
 Electronic funds transfer: This involves gaining an un-authorized
access to bank computer networks and making illegal fund
transfers.
 ATM Fraud: This involves intercepting ATM card details such as
account number and PIN numbers. These details are then used to
withdraw funds from the intercepted accounts.
 Spam: Sending unauthorized emails. These emails usually contain
advertisements.
 A computer virus is a type malware that, when
executed, replicates itself by modifying
other computer programs and inserting its own
code.
 A computer virus is written to alter the way a
computer operates and that is designed to
spread from one computer to another.
 In order for a virus to infect your computer, you
have to run the infected program, which in turn
causes the virus code to be executed.
How do computer viruses spread?
 Email and text message attachments
 Internet file downloads
 Social media links
 Mobile devices and smart phones can become
infected with mobile viruses through shady App
downloads.
 As attachments of socially shareable content
such as funny images, greeting cards, or audio
and video files.
 Inserting or connecting an infected disk, disc, or
drive
 Visiting unknown links
Possible effects of virus attack on a computer
 Delete data
 Overwrite information
 Display messages
 Add itself to other files on the computer
 Stealing passwords or data
 Logging keystrokes
 Corrupting files
 spamming email contacts
 even taking over the machine
 Anti-virus software is a program or set of programs that are
designed to prevent, search for, detect, and remove software
viruses.
 There are several different companies that build and offer anti-
virus software and what each offers can vary but all perform some
basic functions:
 Scan specific files or directories for any malware or known malicious
patterns.
 Allow you to schedule scans to automatically run for you.
 Allow you to initiate a scan of a specific file or of your computer, or of
a CD or flash drive at any time.
 Remove any malicious code detected –sometimes you will be notified
of an infection and asked if you want to clean the file, other programs
will automatically do this behind the scenes.
 Show you the ‘health’ of your computer
 Always be sure you have the best, up-to-date security software
installed to protect your computers, laptops, tablets and smart
phones.
 Spyware is software that aims to gather
information about a person or organization
without their knowledge, that may send such
information to another entity without the
consumer's consent.
 "Spyware" is mostly classified into four
types: adware, system monitors,
tracking cookies, and trojans;
 Spyware that is installed for innocuous reasons is
sometimes referred to as tracking software.
 Spyware can collect almost any type of data,
including personal information like internet
surfing habits, user logins, and bank or credit
account information.
 Spyware can also interfere with a user's control
of a computer by installing additional software or
redirecting web browsers.
 Some spyware can change computer settings,
which can result in slow Internet connection
speeds, un-authorized changes in browser
settings, or changes to software settings.
 If a smart phone gets infected with mobile
spyware that was sideloaded with a third party
app, the phone's camera and microphone can be
used to spy on nearby activity, record phone
calls, log browsing activity and keystrokes, and
monitor the phone owner's location.
How to recognize spyware
 New and/or unidentifiable icons may appear in
the task bar at the bottom of your screen.
 Searches may result in you being redirected to a
different search engine.
 Random error messages appear when you
perform operations that previously worked fine.
 But the best way to identify if you have been
infected is to use a spyware scanner, which will
be included in any spyware removal software.
Spyware Prevention
 Install a security program that lets you know
when any program is being installed, so that you
can choose to authorize or stop the installation.
 In computing, a firewall is a network
security system that monitors and controls the
incoming and outgoing network traffic based on
predetermined security rules.
 A firewall acts as a barrier between a trusted
network and non-trusted network.
 This means that the only traffic allowed onto the
network is defined in the firewall policy; all other
traffic is denied.
 Computer Application Whitelistening − The idea
is to install just a restricted number of
applications in your computers, which are useful
as well as are genuine.
 Computer System Restore Solution − In case
your computer is hacked and your files are
damaged, you should have the possibility to
again have access to your files. An example is
Windows System Restore or Backup.
 Computer and Network Authentication − The
data that is accessed over the network is best to
be provided only to the authorized users. Use
usernames and passwords!!!
 Update Your Software. Keep your software –
including your operating system, the web
browsers you use to connect to the Internet, and
your apps – up to date to protect against the
latest threats.
 Outdated software is easier for criminals to
break into. If you think you have a virus or bad
software on your computer, check out how to
detect and get rid of malware.
 Protect Your Personal Information. Don’t hand it
out to just anyone. Your Social Security number,
credit card numbers, and bank and utility
account numbers can be used to steal your
money or open new accounts in your name. So
every time you are asked for your personal
information – whether in a web form, an email, a
text, or a phone message – think about why
someone needs it and whether you can really
trust the request.
 Give Personal Information Over Encrypted
Websites Only. If you’re shopping or banking
online, stick to sites that use encryption to
protect your information as it travels from your
computer to their server. To determine if a
website is encrypted, look for https at the
beginning of the web address. That means the
site is secure.
 Back Up Your Files. No system is completely
secure. Copy your files to an external hard drive
or cloud storage. If your computer is attacked by
malware, you’ll still have access to your files.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Network security
Network securityNetwork security
Network security
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Internet security
Internet securityInternet security
Internet security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
cyber crime
cyber crimecyber crime
cyber crime
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Security threats
Security threatsSecurity threats
Security threats
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 

Similar a Computer security

BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxCabdullhiY
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
computer security and its relationship to computer forensic
 computer security and its relationship to computer forensic computer security and its relationship to computer forensic
computer security and its relationship to computer forensicShabnamkhan113
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 

Similar a Computer security (20)

BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
computer security and its relationship to computer forensic
 computer security and its relationship to computer forensic computer security and its relationship to computer forensic
computer security and its relationship to computer forensic
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Computer security

  • 2.  Computer Security is the protection of computing systems and the data that they store or access.  Computer security, also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information.
  • 3.
  • 4. Confidentiality  Confidentiality is the concealment of information or resources. Integrity  Integrity is the trustworthiness of data in the systems or resources by the point of view of preventing unauthorized and improper changes. Availability  Availability refers to the ability to access data of a resource when it is needed, as such the information has value only if the authorized people can access at right time.
  • 5.  Unauthorized access − An unauthorized access is when someone gains access to a server, website, or other sensitive data using someone else's account details.  Hacker − Is a Person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.  Threat − Is an action or event that might compromise the security.  Vulnerability − It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding security system.  Attack − Is an assault on the system security that is delivered by a person or a machine to a system. It violates security.
  • 6.  Antivirus or Antimalware − Is a software that operates on different OS which is used to prevent from malicious software.  Social Engineering − Is a technique that a hacker uses to steal data from a person for different purposes by psychological manipulation combined with social scenes.  Virus − It is a malicious software that installs on your computer without your consent for a bad purpose.  Firewall − It is a software or hardware which is used to filter network traffic based on rules.
  • 7.  Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc.  A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
  • 8. Identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the following rules.  Get written permission from the owner of the computer system and/or computer network before hacking.  Protect the privacy of the organization been hacked.  Transparently report all the identified weaknesses in the computer system to the organization.  Inform hardware and software vendors of the identified weaknesses.
  • 9.  Cyber crime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers, etc.  Most cybercrimes are committed through the internet.  Some cybercrimes can also be carried out using Mobile phones via SMS and online chatting applications.
  • 10. Types of Cybercrime  Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on social media, websites, etc.  Identity Theft: Stealing personal information from somebody and impersonating that person.  Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc.  Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.  ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.  Spam: Sending unauthorized emails. These emails usually contain advertisements.
  • 11.  A computer virus is a type malware that, when executed, replicates itself by modifying other computer programs and inserting its own code.  A computer virus is written to alter the way a computer operates and that is designed to spread from one computer to another.  In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.
  • 12. How do computer viruses spread?  Email and text message attachments  Internet file downloads  Social media links  Mobile devices and smart phones can become infected with mobile viruses through shady App downloads.  As attachments of socially shareable content such as funny images, greeting cards, or audio and video files.  Inserting or connecting an infected disk, disc, or drive  Visiting unknown links
  • 13. Possible effects of virus attack on a computer  Delete data  Overwrite information  Display messages  Add itself to other files on the computer  Stealing passwords or data  Logging keystrokes  Corrupting files  spamming email contacts  even taking over the machine
  • 14.  Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses.  There are several different companies that build and offer anti- virus software and what each offers can vary but all perform some basic functions:  Scan specific files or directories for any malware or known malicious patterns.  Allow you to schedule scans to automatically run for you.  Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at any time.  Remove any malicious code detected –sometimes you will be notified of an infection and asked if you want to clean the file, other programs will automatically do this behind the scenes.  Show you the ‘health’ of your computer  Always be sure you have the best, up-to-date security software installed to protect your computers, laptops, tablets and smart phones.
  • 15.  Spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer's consent.  "Spyware" is mostly classified into four types: adware, system monitors, tracking cookies, and trojans;  Spyware that is installed for innocuous reasons is sometimes referred to as tracking software.
  • 16.  Spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information.  Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers.  Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings.
  • 17.  If a smart phone gets infected with mobile spyware that was sideloaded with a third party app, the phone's camera and microphone can be used to spy on nearby activity, record phone calls, log browsing activity and keystrokes, and monitor the phone owner's location.
  • 18. How to recognize spyware  New and/or unidentifiable icons may appear in the task bar at the bottom of your screen.  Searches may result in you being redirected to a different search engine.  Random error messages appear when you perform operations that previously worked fine.  But the best way to identify if you have been infected is to use a spyware scanner, which will be included in any spyware removal software.
  • 19. Spyware Prevention  Install a security program that lets you know when any program is being installed, so that you can choose to authorize or stop the installation.
  • 20.  In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.  A firewall acts as a barrier between a trusted network and non-trusted network.  This means that the only traffic allowed onto the network is defined in the firewall policy; all other traffic is denied.
  • 21.  Computer Application Whitelistening − The idea is to install just a restricted number of applications in your computers, which are useful as well as are genuine.  Computer System Restore Solution − In case your computer is hacked and your files are damaged, you should have the possibility to again have access to your files. An example is Windows System Restore or Backup.  Computer and Network Authentication − The data that is accessed over the network is best to be provided only to the authorized users. Use usernames and passwords!!!
  • 22.  Update Your Software. Keep your software – including your operating system, the web browsers you use to connect to the Internet, and your apps – up to date to protect against the latest threats.  Outdated software is easier for criminals to break into. If you think you have a virus or bad software on your computer, check out how to detect and get rid of malware.
  • 23.  Protect Your Personal Information. Don’t hand it out to just anyone. Your Social Security number, credit card numbers, and bank and utility account numbers can be used to steal your money or open new accounts in your name. So every time you are asked for your personal information – whether in a web form, an email, a text, or a phone message – think about why someone needs it and whether you can really trust the request.
  • 24.  Give Personal Information Over Encrypted Websites Only. If you’re shopping or banking online, stick to sites that use encryption to protect your information as it travels from your computer to their server. To determine if a website is encrypted, look for https at the beginning of the web address. That means the site is secure.  Back Up Your Files. No system is completely secure. Copy your files to an external hard drive or cloud storage. If your computer is attacked by malware, you’ll still have access to your files.