SlideShare a Scribd company logo
1 of 15
Information Security and Privacy

                Presented by:-

               Joy Chakraborty,

              Roll: 11BM91S01,

   Ph.D Scholar, 2011, VGSOM, IIT-Kharagpur



                                              1
What is a Computer Virus?
• Any program that has the ability to reproduce and attach itself to other
  programs is referred to as a computer virus.

• A virus can be designed to do various kinds of damage. It can perform a
  variety of functions ranging from annoying (e.g., popping up messages as a
  joke) to dangerous (e.g., deleting files or destroying your hard disk).

• To qualify as a virus, a program must be able to replicate (make copies of)
  itself. This can mean copying itself to different places on the same
  computer or looking for ways to reach other computers, such as by
  infecting disks or traveling across networks.

• Computer viruses, unlike biological viruses, don’t spring up out of
  nowhere—they’re created by people.


                                                                            2
How Computer viruses work?




                             3
Few Popular Types of Viruses
•   File Infector Viruses - The most “traditional” form of computer virus is the file infector virus,
    which hides within the code of another program. Before the advent of the Internet, file infector
    viruses accounted for probably 85% of all virus infections.

•   Boot Sector Viruses - Boot sector viruses reside in the part of the disk that is read into memory
    and executed when your computer first boots up. Once loaded, the virus can then infect any other
    disk used by the computer; a disk-based boot sector virus can also infect a PC’s hard disk.

•   Trojan Horses - Trojan horses are becoming more common, primarily through the spread of
    Internet-based e-mail. These e-mail Trojans spread as innocent-looking attachments to e-mail
    messages; when you click to open the attachment, you launch the virus.

•   Chat and Instant Messaging Viruses - Most chat and IM programs let you send files across to
    other users; and many users are also accustomed to accepting any files sent to them when they’re
    chatting leading to transfer of viruses.

•   E-mail viruses – E-mail viruses can be transmitted via email messages sent across private networks
    or the Internet. According to Kaspersky Lab, the research arm of the company that produces
    Kaspersky Anti-Virus software, e-mail viruses accounted for 90% of all virus attacks in 2001.

•   Worms – A worm is a program whose purpose is to duplicate itself. Worms replicate themselves
    very quickly; a network infected with a worm can be brought to its knees within a matter of hours


                                                                                                        4
Life-cycle of a computer virus




                                 5
What can a virus do?
• Copy themselves to other programs or areas of a disk.
• Replicate as rapidly and frequently as possible, filling up the infected
  system’s disks and memory, rendering the system useless.
• Display information on the screen.
• Modify, corrupt, or destroy selected files.
• Erase the contents of entire disks.
• Lie dormant for a specified time or until a given condition is met, and then
  becomes active.
• Open a “back door” to the infected system that allows someone else to
  access and even take control of the system through a network or Internet
  connection.


                                                                             6
How one can pick up a virus?
•   Receiving an infected file attached to an e-mail message, or a virus hidden
    within the message itself.

•   Viruses can even be spread through online chat rooms and instant messenger
    programs.

•   Downloading an infected file to your computer across a network, an online
    service, or the Internet.

•   Receiving an infected disk (a diskette, a CD created by someone with a CD-R
    drive, a high-capacity floppy disk and so on) from another user.

•   Copying to a disk a document file that is infected. An infected document might
    be copied from another disk or received as an attachment to an e-mail
    message.

                                                                                 7
Common virus infection symptoms
• Programs quit working or freeze up.
• Documents become inaccessible.
• Computer freezes up or won’t start properly.
• The CAPS LOCK key quits working—or works intermittently.
• Files increase in size.
• Frequent error messages appear onscreen.
• Strange messages or pictures appear onscreen.
• PC emits strange sounds.
• Friends and colleagues inform you that they’ve received strange e-mails
  from you, that you don’t remember sending.


                                                                            8
Prevention against Viruses

• Restrict your file downloading to known or secure sources

• Don’t open any e-mail attachments you weren’t expecting

• Use an up-to-date anti-virus program or service

• Create backup copies of all your important data

• Enable virus protection in all your applications

• Usage of Firewalls

                                                              9
Usage of Firewalls




• A firewall is a barrier to keep destructive forces away from your property, if one
has been using the Internet for any length of time, and especially if one works at a
larger company and browse the Web while he is at work

• Its job is similar to a physical firewall that keeps a fire from spreading from one
area to the next.

• Firewalls have helped protect computers in large companies for years.
Now, they're a critical component of home networks, as well.
                                                                                        10
Data Security issues in USA
•   Computer security in USA has received attention in recent years by reports of
    striking computer viruses and dramatic computer crimes that involve large sums of
    money.

•   The FBI uniform crime statistics do not separate computer from other sorts of
    crime.

•   Most of the incidents that are detected is not publicized because of shame, or
    because of fear of damage to the organization’s or its management’s reputation, or
    because of an agreement not to prosecute if the criminal goes away.

•   US Dollar estimates of computer crime losses are only vague estimates and range
    from $ 300 million to $ 500 billion per year. [Most of the expenses come from the
    time and effort required to locate and remove viruses, restore systems, rebuild lost
    or corrupted data, and ensure against future attacks.]

•   Protection against computer crimes is made difficult due to the multiplicity of
    targets and points of penetration.


                                                                                      11
Categories of Security Breaches
•   Computer crime cases that involve software security breaches can be classified into 4
    categories:
     Interruption
     Interception
     Modification
     Fabrication

•   In an Interruption, an asset (hardware, software, or data) of the Computer-Based
    Information System (CBIS) becomes unavailable, unusable or lost.

•   An Interception occurs when an unauthorized party has gained access to an asset.

•   Modification represents the security breach when an unauthorized party not only
    accesses but tampers with an asset.

•   Fabrication refers to introduction of counterfeit objects into a CBIS.


                                                                                            12
The Privacy Act of 1974
•    The Privacy Act of 1974 (Dec.31, 1974) states :

     No agency shall disclose any record which is contained in a system of records by any
     means of communication to any person, or to another agency, except pursuant to a
     written request by, or with the prior written consent of, the individual to whom the
     record pertains.

•    The Privacy Act mandates that each US Govt. agency have in place an administrative
     and physical security system to prevent the unauthorized release of personal records.

•    Federal agencies are subject to damages if an individual’s rights are violated.

•    There are specific exceptions allowing the use of personal records:

1.    For statistical purposes by the Census Bureau and the Bureau of Labor Statistics
2.    For routine uses within a U.S. government agency
3.    For law enforcement purposes
4.    For congressional investigations
5.    Other administrative purposes

                                                                                             13
References:-
•   “Appendix C – Computer Viruses”, Introduction to Computers by Peter Norton,
    sixth edition, McGraw Hill companies.

•   “Social and Ethical Issues in Information Systems”, (Chapter-19), Principles of
    Information Systems – A Managerial Approach, by Ralph M. Stair, Boyd and
    Fraser Publishing company.

•   Computer Security Institute (CSI), http://www.gocsi.com

•   IBM Anti-virus Research, http://www.research.ibm.com/antivirus

•   “How Firewalls work”, http://www.howstuffworks.com/firewall.htm

•   Wikipedia sources


                                                                                      14
THANK YOU



            15

More Related Content

What's hot

Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computererashmi1234
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Anna Stirling
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Rahman_Hussain
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItSonali Srivastava
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 

What's hot (20)

Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
System failure
System  failureSystem  failure
System failure
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computere
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
Software theft
Software theftSoftware theft
Software theft
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Information security
Information securityInformation security
Information security
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Computer security and
Computer security andComputer security and
Computer security and
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 

Viewers also liked

Hvordan lage en god frokost ny uten link
Hvordan lage en god frokost ny uten linkHvordan lage en god frokost ny uten link
Hvordan lage en god frokost ny uten linkbenedictel
 
Differences culture peruvian and finnish culture
Differences culture peruvian and finnish cultureDifferences culture peruvian and finnish culture
Differences culture peruvian and finnish cultureEvelyn Kryss Vivanco Morán
 
EXPORTATION OF TECHNICAL COMMUNICATION JOBS AND STRATEGIES FOR COMPETITION
EXPORTATION OF TECHNICAL COMMUNICATION JOBS AND STRATEGIES FOR COMPETITIONEXPORTATION OF TECHNICAL COMMUNICATION JOBS AND STRATEGIES FOR COMPETITION
EXPORTATION OF TECHNICAL COMMUNICATION JOBS AND STRATEGIES FOR COMPETITIONMarkel Simmons
 
Ly 2011 đề thi thử số 7
Ly 2011  đề thi thử số 7Ly 2011  đề thi thử số 7
Ly 2011 đề thi thử số 7tinhban269
 
Capa quality system – more than just corrective action
Capa quality system – more than just corrective actionCapa quality system – more than just corrective action
Capa quality system – more than just corrective actionQuality Management
 
Boomers Technology and Health: Consumers Taking Charge!
Boomers Technology and Health: Consumers Taking Charge!Boomers Technology and Health: Consumers Taking Charge!
Boomers Technology and Health: Consumers Taking Charge!HealthInnoventions
 
Censo de imagen urbana calles-
Censo de imagen urbana  calles-Censo de imagen urbana  calles-
Censo de imagen urbana calles-LuisEduardoIV
 
Is Mobile the Prescription for Sustained Behavior Change?
Is Mobile the Prescription for Sustained Behavior Change?Is Mobile the Prescription for Sustained Behavior Change?
Is Mobile the Prescription for Sustained Behavior Change?HealthInnoventions
 
Jane's Walk, Colchester - 2013 Walk Timetable
Jane's Walk, Colchester - 2013 Walk TimetableJane's Walk, Colchester - 2013 Walk Timetable
Jane's Walk, Colchester - 2013 Walk TimetableFaye Savage
 
2012 04-01 spiritual-giftssunday
2012 04-01 spiritual-giftssunday2012 04-01 spiritual-giftssunday
2012 04-01 spiritual-giftssundayLeandro Chico
 

Viewers also liked (19)

Hvordan lage en god frokost ny uten link
Hvordan lage en god frokost ny uten linkHvordan lage en god frokost ny uten link
Hvordan lage en god frokost ny uten link
 
Enersave barriers
Enersave barriersEnersave barriers
Enersave barriers
 
Nbfc
NbfcNbfc
Nbfc
 
Differences culture peruvian and finnish culture
Differences culture peruvian and finnish cultureDifferences culture peruvian and finnish culture
Differences culture peruvian and finnish culture
 
EXPORTATION OF TECHNICAL COMMUNICATION JOBS AND STRATEGIES FOR COMPETITION
EXPORTATION OF TECHNICAL COMMUNICATION JOBS AND STRATEGIES FOR COMPETITIONEXPORTATION OF TECHNICAL COMMUNICATION JOBS AND STRATEGIES FOR COMPETITION
EXPORTATION OF TECHNICAL COMMUNICATION JOBS AND STRATEGIES FOR COMPETITION
 
презентация Pmi уфа февраль_2016
презентация Pmi уфа февраль_2016презентация Pmi уфа февраль_2016
презентация Pmi уфа февраль_2016
 
Ly 2011 đề thi thử số 7
Ly 2011  đề thi thử số 7Ly 2011  đề thi thử số 7
Ly 2011 đề thi thử số 7
 
Capa quality system – more than just corrective action
Capa quality system – more than just corrective actionCapa quality system – more than just corrective action
Capa quality system – more than just corrective action
 
Copias vidrio
Copias vidrioCopias vidrio
Copias vidrio
 
Trignometria 13
Trignometria 13Trignometria 13
Trignometria 13
 
Boomers Technology and Health: Consumers Taking Charge!
Boomers Technology and Health: Consumers Taking Charge!Boomers Technology and Health: Consumers Taking Charge!
Boomers Technology and Health: Consumers Taking Charge!
 
Censo de imagen urbana calles-
Censo de imagen urbana  calles-Censo de imagen urbana  calles-
Censo de imagen urbana calles-
 
Paremvasi perioristikes endonoukleases
Paremvasi perioristikes endonoukleasesParemvasi perioristikes endonoukleases
Paremvasi perioristikes endonoukleases
 
Is Mobile the Prescription for Sustained Behavior Change?
Is Mobile the Prescription for Sustained Behavior Change?Is Mobile the Prescription for Sustained Behavior Change?
Is Mobile the Prescription for Sustained Behavior Change?
 
Big book
Big bookBig book
Big book
 
Probiotyk
ProbiotykProbiotyk
Probiotyk
 
Jane's Walk, Colchester - 2013 Walk Timetable
Jane's Walk, Colchester - 2013 Walk TimetableJane's Walk, Colchester - 2013 Walk Timetable
Jane's Walk, Colchester - 2013 Walk Timetable
 
Current event
Current eventCurrent event
Current event
 
2012 04-01 spiritual-giftssunday
2012 04-01 spiritual-giftssunday2012 04-01 spiritual-giftssunday
2012 04-01 spiritual-giftssunday
 

Similar to Information security and privacy

Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxsachingwalani24
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
COMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptxCOMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptxT Tanujha
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Computer security.pptx
Computer security.pptxComputer security.pptx
Computer security.pptxGovandJamal
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimenidhidgowda185
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 

Similar to Information security and privacy (20)

Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
COmPuter
COmPuterCOmPuter
COmPuter
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
COMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptxCOMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptx
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Computer security.pptx
Computer security.pptxComputer security.pptx
Computer security.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 

Recently uploaded

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 

Information security and privacy

  • 1. Information Security and Privacy Presented by:- Joy Chakraborty, Roll: 11BM91S01, Ph.D Scholar, 2011, VGSOM, IIT-Kharagpur 1
  • 2. What is a Computer Virus? • Any program that has the ability to reproduce and attach itself to other programs is referred to as a computer virus. • A virus can be designed to do various kinds of damage. It can perform a variety of functions ranging from annoying (e.g., popping up messages as a joke) to dangerous (e.g., deleting files or destroying your hard disk). • To qualify as a virus, a program must be able to replicate (make copies of) itself. This can mean copying itself to different places on the same computer or looking for ways to reach other computers, such as by infecting disks or traveling across networks. • Computer viruses, unlike biological viruses, don’t spring up out of nowhere—they’re created by people. 2
  • 4. Few Popular Types of Viruses • File Infector Viruses - The most “traditional” form of computer virus is the file infector virus, which hides within the code of another program. Before the advent of the Internet, file infector viruses accounted for probably 85% of all virus infections. • Boot Sector Viruses - Boot sector viruses reside in the part of the disk that is read into memory and executed when your computer first boots up. Once loaded, the virus can then infect any other disk used by the computer; a disk-based boot sector virus can also infect a PC’s hard disk. • Trojan Horses - Trojan horses are becoming more common, primarily through the spread of Internet-based e-mail. These e-mail Trojans spread as innocent-looking attachments to e-mail messages; when you click to open the attachment, you launch the virus. • Chat and Instant Messaging Viruses - Most chat and IM programs let you send files across to other users; and many users are also accustomed to accepting any files sent to them when they’re chatting leading to transfer of viruses. • E-mail viruses – E-mail viruses can be transmitted via email messages sent across private networks or the Internet. According to Kaspersky Lab, the research arm of the company that produces Kaspersky Anti-Virus software, e-mail viruses accounted for 90% of all virus attacks in 2001. • Worms – A worm is a program whose purpose is to duplicate itself. Worms replicate themselves very quickly; a network infected with a worm can be brought to its knees within a matter of hours 4
  • 5. Life-cycle of a computer virus 5
  • 6. What can a virus do? • Copy themselves to other programs or areas of a disk. • Replicate as rapidly and frequently as possible, filling up the infected system’s disks and memory, rendering the system useless. • Display information on the screen. • Modify, corrupt, or destroy selected files. • Erase the contents of entire disks. • Lie dormant for a specified time or until a given condition is met, and then becomes active. • Open a “back door” to the infected system that allows someone else to access and even take control of the system through a network or Internet connection. 6
  • 7. How one can pick up a virus? • Receiving an infected file attached to an e-mail message, or a virus hidden within the message itself. • Viruses can even be spread through online chat rooms and instant messenger programs. • Downloading an infected file to your computer across a network, an online service, or the Internet. • Receiving an infected disk (a diskette, a CD created by someone with a CD-R drive, a high-capacity floppy disk and so on) from another user. • Copying to a disk a document file that is infected. An infected document might be copied from another disk or received as an attachment to an e-mail message. 7
  • 8. Common virus infection symptoms • Programs quit working or freeze up. • Documents become inaccessible. • Computer freezes up or won’t start properly. • The CAPS LOCK key quits working—or works intermittently. • Files increase in size. • Frequent error messages appear onscreen. • Strange messages or pictures appear onscreen. • PC emits strange sounds. • Friends and colleagues inform you that they’ve received strange e-mails from you, that you don’t remember sending. 8
  • 9. Prevention against Viruses • Restrict your file downloading to known or secure sources • Don’t open any e-mail attachments you weren’t expecting • Use an up-to-date anti-virus program or service • Create backup copies of all your important data • Enable virus protection in all your applications • Usage of Firewalls 9
  • 10. Usage of Firewalls • A firewall is a barrier to keep destructive forces away from your property, if one has been using the Internet for any length of time, and especially if one works at a larger company and browse the Web while he is at work • Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. • Firewalls have helped protect computers in large companies for years. Now, they're a critical component of home networks, as well. 10
  • 11. Data Security issues in USA • Computer security in USA has received attention in recent years by reports of striking computer viruses and dramatic computer crimes that involve large sums of money. • The FBI uniform crime statistics do not separate computer from other sorts of crime. • Most of the incidents that are detected is not publicized because of shame, or because of fear of damage to the organization’s or its management’s reputation, or because of an agreement not to prosecute if the criminal goes away. • US Dollar estimates of computer crime losses are only vague estimates and range from $ 300 million to $ 500 billion per year. [Most of the expenses come from the time and effort required to locate and remove viruses, restore systems, rebuild lost or corrupted data, and ensure against future attacks.] • Protection against computer crimes is made difficult due to the multiplicity of targets and points of penetration. 11
  • 12. Categories of Security Breaches • Computer crime cases that involve software security breaches can be classified into 4 categories: Interruption Interception Modification Fabrication • In an Interruption, an asset (hardware, software, or data) of the Computer-Based Information System (CBIS) becomes unavailable, unusable or lost. • An Interception occurs when an unauthorized party has gained access to an asset. • Modification represents the security breach when an unauthorized party not only accesses but tampers with an asset. • Fabrication refers to introduction of counterfeit objects into a CBIS. 12
  • 13. The Privacy Act of 1974 • The Privacy Act of 1974 (Dec.31, 1974) states : No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains. • The Privacy Act mandates that each US Govt. agency have in place an administrative and physical security system to prevent the unauthorized release of personal records. • Federal agencies are subject to damages if an individual’s rights are violated. • There are specific exceptions allowing the use of personal records: 1. For statistical purposes by the Census Bureau and the Bureau of Labor Statistics 2. For routine uses within a U.S. government agency 3. For law enforcement purposes 4. For congressional investigations 5. Other administrative purposes 13
  • 14. References:- • “Appendix C – Computer Viruses”, Introduction to Computers by Peter Norton, sixth edition, McGraw Hill companies. • “Social and Ethical Issues in Information Systems”, (Chapter-19), Principles of Information Systems – A Managerial Approach, by Ralph M. Stair, Boyd and Fraser Publishing company. • Computer Security Institute (CSI), http://www.gocsi.com • IBM Anti-virus Research, http://www.research.ibm.com/antivirus • “How Firewalls work”, http://www.howstuffworks.com/firewall.htm • Wikipedia sources 14
  • 15. THANK YOU 15