SlideShare una empresa de Scribd logo
1 de 43
Computer Security Risks
 Today, people rely on computers to create, store,
and manage critical information. Thus, it is crucial
that users take measures to protect their computers
and data from loss, damage, and misuse. A
computer security risk is any event or action that
could cause a loss of or damage to computer
hardware, software, data, information, or
processing capability. While some breaches to
computer security are accidental, many are
intentional. Some intruders do no damage; they
merely access data, information, or programs on
Hacker
 The term hacker, although originally a
complimentary word for a computer enthusiast, now
has a derogatory meaning and refers to someone
who accesses a computer or network illegally.
Unethical Access
 Unethical employees break into their employers’
computers for a variety of reasons. Some simply
want to exploit a security weakness. Others seek
financial gains from selling confidential information.
Computer Security , Risks
and SafeGuards
 Computer Security: The protection of computer systems
and information from harm, theft, and unauthorized use
 Risks: The thefts, harms and data loss are involved in Risks
of Computer
 SafeGuards: The software's and the ways for securing and
protecting the Computer from harms
Computer Security
 Computer security, also known as cyber security or
IT security, is the protection of:
 information systems from theft or damage to the
hardware, the software, and to the information on
them,
 as well as from disruption or misdirection of the
services they provide
 from unauthorized use and damage and from
sabotage and natural disasters
Concerns of Computer Security
 Confidentiality: Only authorized users can
access the data resources and information.
 Integrity: Only authorized users should be
able to modify the data when needed.
 Availability: Data should be available to users
when needed.
 Authentication: are you really communicating
with whom you think you are communicating
with
Computer Risks
 It is any event or action that could cause a loss of or
damage to computer hardware, software, data
information or processing capability.
Risks involved are:
 Hardware Thefts
 Software Thefts
 Theft of online Movie and Music
 THEFT OF TIME & SERVICES
 Internet and Networks Attack
 System Failure
Hardware Theft
 Hardware theft is the unauthorized taking of
computer hardware. In some cases, corporate
or government hardware is stolen to be sold,
but in other cases, personal items are
targeted. The popularity of smartphones and
tablets has made hardware theft a common
crime in major cities
Software Theft
 Software theft means the unauthorized or
illegal copying, sharing or usage of copyright-
protected software programs. Software theft
may be carried out by individuals, groups or, in
some cases, organizations who then distribute
the unauthorized software copies to users.
THEFT OF ONLINE MUSIC &
MOVIES
 Many students may feel that illegally
downloading music and movies is a victimless
crime, but to the entertainment industry it is
just plain piracy or theft.
THEFT OF TIME & SERVICES
 The theft of computer time is more common
than you might think. Probably the biggest
instance is people using their employer’s
computer time to play games, do online
shopping . Some people even operate
sideline businesses.
Internet and Networks Attack
 A security breaching attempt and network attack
is defined as a threat. Most of the attacks
including intrusion, denial of service or other on
a network infrastructure analyze the entire
network in order to gain the information.
 After gaining the required information, such
attacks eventually cause your network to corrupt
or crash. Different attackers may different types
of network attacks as they might not be
interested only in ‘exploiting software
applications, but also get unauthorized access of
virus
 A computer virus is a potentially damaging
computer program that affects, or infects, a
computer negatively by altering the way the
computer works without the user’s knowledge or
permission. Once the virus infects the computer, it
can spread throughout and may damage files and
system software, including the operating system.
Virus
worm
 A worm is a program that copies itself repeatedly,
for example in memory or on a network, using up
resources and possibly shutting down the
computer or network.
Trojan horse
 A Trojan horse is a program that hides within or
looks like a legitimate program. A certain condition or
action usually triggers the Trojan horse. Unlike a
virus or worm, a Trojan horse does not replicate itself
to other computers.
Rootkit
 A rootkit is a program that hides in a computer and
allows someone from a remote location to take full
control of the computer. Once the rootkit is installed,
the rootkit author can execute programs, change
settings, monitor activity, and access files on the
remote computer.
System Failure
 A system failure can occur because of a
hardware failure or a several software issue,
causing the system to freeze, reboot, or stop
functioning altogether. A system failure may or
may not result in an error being displayed on
the screen. The computer may shut off without
warning and without any error message.
 If an error message is displayed, it often is
displayed as a Blue Screen of Death error.
 In computer security a threat is a possible
danger that might exploit a vulnerability to
breach security and thus cause possible harm.
 A threat can be either “intentional” (i.e.
intelligent) or “ accidently”(the possibility of a
computer malfunctioning).
Computer Safeguards
 The software's and other programs which are used
to safe the computer from risks are included in
Safeguards and protection of Computer
Safe Guards include:
 Fire Walls Proxy Server
 Encryption
 Anti Viruses
 BIOMETRIC AUTHENTICATION
 Secure Passwords
Computer Safeguards
Fire Walls
 Firewall is a network device that isolates
organization’s internal network from larger
outside network/Internet. It can be a hardware,
software, or combined system that prevents
unauthorized access to or from internal
network.
 All data packets entering or leaving the
internal network pass through the firewall,
which examines each packet and blocks those
that do not meet the specified security criteria.
Fire Walls
Anti Viruses
 All antivirus engines have three components to
function accordingly. It is important to have a
look at these functions because it will help us
for better manual cleaning of viruses in case
we need.
 Scanning − When a new virus is detected in
the cyberspace, antivirus producers start
writing programs (updates) that scans for
similar signature strings.
Anti Viruses
 Integrity Checking − This method generally
checks for manipulated files in OS from the
viruses.
 Interception − This method is used basically
to detect Trojans and it checks the request
made by the operating system for network
access.
Anti Viruses
Online Virus Testing
 If the system administrator does not have an
antivirus installed or suspects a file that is
infected. They would recommend to use the
online testing antivirus engine which
(according to me) is one of the best
 https://www.virustotal.com
Free Antivirus Software
 Avast Antivirus
 AVG Antivirus
 Panda Antivirus 2019
 Microsoft Security Essentials
Free Antivirus Software
Encryption
 Encryption is a security method in which
information is encoded in such a way that only
authorized user can read it. It uses encryption
algorithm to generate cipher text that can only
be read if decrypted.
 List of Encryption Method
 Advanced Encryption Standard, AES
 Triple Data Encryption Standard and etc
Password
Rules in Creating Passwords
 Rule 1: Don’t tell anyone your user name and
password: Of course you shouldn’t tell strangers.
You also shouldn’t even tell friends or relatives.
 • Rule 2: Don’t use passwords that can be easily
guessed: Don’t use “12345,” the word “password,”
variations on your name, your nickname, your
street address, mother’s maiden name, pet’s
name, college name, or name of your favorite
sports team.
Rules in Creating Passwords
 Rule 3: Avoid any word that appears in a
dictionary: Instead, use weird combinations of
letters, numbers, and punctuation. Mix
uppercase and lowercase, along with special
characters such as !, #, and %.
 Rule 4: Create long passwords, especially for
sensitive sites: For financial accounts, for
instance, 15-character passwords are
recommended (which are 33,000 times harder
to crack than an 8-character one).55
Rules in Creating Passwords
 Rule 5: Don’t use the same password for multiple
sites: Avoid reusing the same password at different
sites, since if hackers or scammers obtain one
account, they potentially have your entire online
life. If you do use the same password for multiple
purposes, use it only for low-risk sites, such as
newspaper registrations.
 Rule 6: Change passwords often: Change
passwords often, such as every 4 or 6 weeks or on
a set schedule such as the first day of spring,
summer, and so on. Change passwords when you
BIOMETRIC
AUTHENTICATION
 A hacker can easily breach a computer
system with a guessed or stolen password.
But some forms of identification can’t be easily
faked—such as your physical traits.
Biometrics, the science of measuring
individual body characteristics, tries to use
these in security devices. Biometric
authentication devices authenticate a person’s
identity by comparing his or her physical or
behavioral characteristics with digital code
stored in a computer system.
BIOMETRIC
AUTHENTICATION
 There are several kinds of devices for verifying
physical or behavioral characteristics that can
be used to authenticate a person’s identity
 Hand-geometry systems: Also known as full-
hand palm scanners, these are devices to
verify a person’s identity by scanning the entire
hand, which, for each person, is as unique as
a fingerprint and changes little over time.
BIOMETRIC
AUTHENTICATION
 Fingerprint scanners: These range from optical
readers, in which you place a finger over a window,
to swipe readers, such as those built into laptops
and some handhelds, which allow you to run your
finger across a bar like sensor. Microsoft offers
optical fingerprint readers to go with Windows
XP/Vista.
 • Iris-recognition systems: Because no two
people’s eyes are alike, iris scans are very reliable
identifiers. In Europe, some airports are using iris-
scanning systems as a way of speeding up
BIOMETRIC
AUTHENTICATION
 Face-recognition systems: Facial-recognition
systems may come to play an important role in
biometric photos embedded in U.S. passports and
those of other industrialized nations during the next
few years. The technology, which compares a live
face image with a digitized image stored in a
computer, is even used now as a security system for
some notebook computers. 53
 • Voice-recognition systems: These systems
compare a person’s voice with digitized voice prints
stored in a computer, which the individual has
Conclusion
 For the betterment of the computer usage we
have to secure our data and information.
 For this purpose we should take care of the risks
involved while using computer programs and
installed computer security and safeguards to
overcome risks.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Malware
MalwareMalware
Malware
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Security threats
Security threatsSecurity threats
Security threats
 
Cyber security
Cyber securityCyber security
Cyber security
 
Spyware
SpywareSpyware
Spyware
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 

Similar a Ch # 10 computer security risks and safe guards

SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfasujal2009
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryrryrsyd
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Internet security
Internet securityInternet security
Internet securityat1211
 

Similar a Ch # 10 computer security risks and safe guards (20)

Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Computer security
Computer securityComputer security
Computer security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
computer security
computer securitycomputer security
computer security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Internet security
Internet securityInternet security
Internet security
 

Más de MuhammadRobeel3

Más de MuhammadRobeel3 (17)

Programming languages
Programming languagesProgramming languages
Programming languages
 
Osi model
Osi modelOsi model
Osi model
 
Memory management
Memory managementMemory management
Memory management
 
Command line interface
Command line interfaceCommand line interface
Command line interface
 
Ch # 11
Ch # 11Ch # 11
Ch # 11
 
Ch # 09 database management system
Ch # 09 database management systemCh # 09 database management system
Ch # 09 database management system
 
Ch # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocolCh # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocol
 
Ch # 07 operating system
Ch # 07 operating systemCh # 07 operating system
Ch # 07 operating system
 
Ch # 06 storage devices
Ch # 06 storage devicesCh # 06 storage devices
Ch # 06 storage devices
 
Ch # 05 input and output devices in computer
Ch # 05 input and output devices in computerCh # 05 input and output devices in computer
Ch # 05 input and output devices in computer
 
Ch # 04 computer hardware
Ch # 04 computer hardware Ch # 04 computer hardware
Ch # 04 computer hardware
 
Ch # 03 software
Ch # 03  softwareCh # 03  software
Ch # 03 software
 
Ch # 02 internet
Ch # 02 internetCh # 02 internet
Ch # 02 internet
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
pdlc
pdlc pdlc
pdlc
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
SDLC
SDLCSDLC
SDLC
 

Último

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Último (20)

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Ch # 10 computer security risks and safe guards

  • 1.
  • 2. Computer Security Risks  Today, people rely on computers to create, store, and manage critical information. Thus, it is crucial that users take measures to protect their computers and data from loss, damage, and misuse. A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. While some breaches to computer security are accidental, many are intentional. Some intruders do no damage; they merely access data, information, or programs on
  • 3. Hacker  The term hacker, although originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally.
  • 4.
  • 5. Unethical Access  Unethical employees break into their employers’ computers for a variety of reasons. Some simply want to exploit a security weakness. Others seek financial gains from selling confidential information.
  • 6. Computer Security , Risks and SafeGuards  Computer Security: The protection of computer systems and information from harm, theft, and unauthorized use  Risks: The thefts, harms and data loss are involved in Risks of Computer  SafeGuards: The software's and the ways for securing and protecting the Computer from harms
  • 7. Computer Security  Computer security, also known as cyber security or IT security, is the protection of:  information systems from theft or damage to the hardware, the software, and to the information on them,  as well as from disruption or misdirection of the services they provide  from unauthorized use and damage and from sabotage and natural disasters
  • 8. Concerns of Computer Security  Confidentiality: Only authorized users can access the data resources and information.  Integrity: Only authorized users should be able to modify the data when needed.  Availability: Data should be available to users when needed.  Authentication: are you really communicating with whom you think you are communicating with
  • 9. Computer Risks  It is any event or action that could cause a loss of or damage to computer hardware, software, data information or processing capability. Risks involved are:  Hardware Thefts  Software Thefts  Theft of online Movie and Music  THEFT OF TIME & SERVICES  Internet and Networks Attack  System Failure
  • 10. Hardware Theft  Hardware theft is the unauthorized taking of computer hardware. In some cases, corporate or government hardware is stolen to be sold, but in other cases, personal items are targeted. The popularity of smartphones and tablets has made hardware theft a common crime in major cities
  • 11.
  • 12. Software Theft  Software theft means the unauthorized or illegal copying, sharing or usage of copyright- protected software programs. Software theft may be carried out by individuals, groups or, in some cases, organizations who then distribute the unauthorized software copies to users.
  • 13.
  • 14. THEFT OF ONLINE MUSIC & MOVIES  Many students may feel that illegally downloading music and movies is a victimless crime, but to the entertainment industry it is just plain piracy or theft.
  • 15. THEFT OF TIME & SERVICES  The theft of computer time is more common than you might think. Probably the biggest instance is people using their employer’s computer time to play games, do online shopping . Some people even operate sideline businesses.
  • 16. Internet and Networks Attack  A security breaching attempt and network attack is defined as a threat. Most of the attacks including intrusion, denial of service or other on a network infrastructure analyze the entire network in order to gain the information.  After gaining the required information, such attacks eventually cause your network to corrupt or crash. Different attackers may different types of network attacks as they might not be interested only in ‘exploiting software applications, but also get unauthorized access of
  • 17. virus  A computer virus is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. Once the virus infects the computer, it can spread throughout and may damage files and system software, including the operating system.
  • 18. Virus
  • 19. worm  A worm is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.
  • 20. Trojan horse  A Trojan horse is a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the Trojan horse. Unlike a virus or worm, a Trojan horse does not replicate itself to other computers.
  • 21. Rootkit  A rootkit is a program that hides in a computer and allows someone from a remote location to take full control of the computer. Once the rootkit is installed, the rootkit author can execute programs, change settings, monitor activity, and access files on the remote computer.
  • 22. System Failure  A system failure can occur because of a hardware failure or a several software issue, causing the system to freeze, reboot, or stop functioning altogether. A system failure may or may not result in an error being displayed on the screen. The computer may shut off without warning and without any error message.  If an error message is displayed, it often is displayed as a Blue Screen of Death error.
  • 23.  In computer security a threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm.  A threat can be either “intentional” (i.e. intelligent) or “ accidently”(the possibility of a computer malfunctioning).
  • 25.  The software's and other programs which are used to safe the computer from risks are included in Safeguards and protection of Computer Safe Guards include:  Fire Walls Proxy Server  Encryption  Anti Viruses  BIOMETRIC AUTHENTICATION  Secure Passwords Computer Safeguards
  • 26. Fire Walls  Firewall is a network device that isolates organization’s internal network from larger outside network/Internet. It can be a hardware, software, or combined system that prevents unauthorized access to or from internal network.  All data packets entering or leaving the internal network pass through the firewall, which examines each packet and blocks those that do not meet the specified security criteria.
  • 28. Anti Viruses  All antivirus engines have three components to function accordingly. It is important to have a look at these functions because it will help us for better manual cleaning of viruses in case we need.  Scanning − When a new virus is detected in the cyberspace, antivirus producers start writing programs (updates) that scans for similar signature strings.
  • 29. Anti Viruses  Integrity Checking − This method generally checks for manipulated files in OS from the viruses.  Interception − This method is used basically to detect Trojans and it checks the request made by the operating system for network access.
  • 31. Online Virus Testing  If the system administrator does not have an antivirus installed or suspects a file that is infected. They would recommend to use the online testing antivirus engine which (according to me) is one of the best  https://www.virustotal.com
  • 32. Free Antivirus Software  Avast Antivirus  AVG Antivirus  Panda Antivirus 2019  Microsoft Security Essentials
  • 34. Encryption  Encryption is a security method in which information is encoded in such a way that only authorized user can read it. It uses encryption algorithm to generate cipher text that can only be read if decrypted.  List of Encryption Method  Advanced Encryption Standard, AES  Triple Data Encryption Standard and etc
  • 36. Rules in Creating Passwords  Rule 1: Don’t tell anyone your user name and password: Of course you shouldn’t tell strangers. You also shouldn’t even tell friends or relatives.  • Rule 2: Don’t use passwords that can be easily guessed: Don’t use “12345,” the word “password,” variations on your name, your nickname, your street address, mother’s maiden name, pet’s name, college name, or name of your favorite sports team.
  • 37. Rules in Creating Passwords  Rule 3: Avoid any word that appears in a dictionary: Instead, use weird combinations of letters, numbers, and punctuation. Mix uppercase and lowercase, along with special characters such as !, #, and %.  Rule 4: Create long passwords, especially for sensitive sites: For financial accounts, for instance, 15-character passwords are recommended (which are 33,000 times harder to crack than an 8-character one).55
  • 38. Rules in Creating Passwords  Rule 5: Don’t use the same password for multiple sites: Avoid reusing the same password at different sites, since if hackers or scammers obtain one account, they potentially have your entire online life. If you do use the same password for multiple purposes, use it only for low-risk sites, such as newspaper registrations.  Rule 6: Change passwords often: Change passwords often, such as every 4 or 6 weeks or on a set schedule such as the first day of spring, summer, and so on. Change passwords when you
  • 39. BIOMETRIC AUTHENTICATION  A hacker can easily breach a computer system with a guessed or stolen password. But some forms of identification can’t be easily faked—such as your physical traits. Biometrics, the science of measuring individual body characteristics, tries to use these in security devices. Biometric authentication devices authenticate a person’s identity by comparing his or her physical or behavioral characteristics with digital code stored in a computer system.
  • 40. BIOMETRIC AUTHENTICATION  There are several kinds of devices for verifying physical or behavioral characteristics that can be used to authenticate a person’s identity  Hand-geometry systems: Also known as full- hand palm scanners, these are devices to verify a person’s identity by scanning the entire hand, which, for each person, is as unique as a fingerprint and changes little over time.
  • 41. BIOMETRIC AUTHENTICATION  Fingerprint scanners: These range from optical readers, in which you place a finger over a window, to swipe readers, such as those built into laptops and some handhelds, which allow you to run your finger across a bar like sensor. Microsoft offers optical fingerprint readers to go with Windows XP/Vista.  • Iris-recognition systems: Because no two people’s eyes are alike, iris scans are very reliable identifiers. In Europe, some airports are using iris- scanning systems as a way of speeding up
  • 42. BIOMETRIC AUTHENTICATION  Face-recognition systems: Facial-recognition systems may come to play an important role in biometric photos embedded in U.S. passports and those of other industrialized nations during the next few years. The technology, which compares a live face image with a digitized image stored in a computer, is even used now as a security system for some notebook computers. 53  • Voice-recognition systems: These systems compare a person’s voice with digitized voice prints stored in a computer, which the individual has
  • 43. Conclusion  For the betterment of the computer usage we have to secure our data and information.  For this purpose we should take care of the risks involved while using computer programs and installed computer security and safeguards to overcome risks.