View stunning SlideShares in full-screen with the new iOS app!Introducing SlideShare for AndroidExplore all your favorite topics in the SlideShare appGet the SlideShare app to Save for Later — even offline
View stunning SlideShares in full-screen with the new Android app!View stunning SlideShares in full-screen with the new iOS app!
1Computer security AgainstthreatsA presentation by Vishwaraj Yadavand Saurav Mohapatra of class 11thCannas
2Contents• Security of computer• Threats to computer security• Solutions to computer threats
Security of system• Nowadays, Computers are usedeverywhere. Various data is sharedfrom one computer to another. Butsometimes the data is not trustworthy,or it behaves in an undesired manner. Ifthis happens then our computer isinsecure.3
Continued….• So to make our computer secured weneed Computer security.• It is the ability of computer to protectinformation & system resources withrespect to confidentiality & integrity.4
• A threat is a potential violation tosecurity. When it is executed it becomesattack.5Threats to computersecurity
6Threats to computersecurityPCIntrusionSpyware Adware Spamming VirusesWormsTrojansPhishing
7Computer Virus• Viruses are malicious codes that causedamage to data, they can attack to anypart of computer’s software such as bootblock, files & application programs etc.• Worms & Trojan horses are similarprograms having virus-like effects.
Computer Virus• Worms- A self-replicating programwhich eats up the entire disk space ormemory.• Trojan Horses- It is a program whichappears harmless but performsmalicious functions such as deleting ordamaging files.8
Computer Virus• How do viruses damage computer?1. They damage or delete files.2. Slow down the computer.3. Invade your email program.9
11Computer VirusTypes of Computer Virus• Boot Sector VirusBoot sector viruses infect the boot sectors on floppydisks and hard disks, and can also infect the masterboot record on a users hard drive.• File VirusOperate in memory and usually infect executable files.• Polymorphic virusThey mutate their own code to make it difficult forantivirus to detect and remove.
Computer Virus• Multi-partite VirusMulti-partite viruses have characteristicsof both boot sector viruses and fileinfector viruses.• Macro VirusThey infect macro utilities that accompanysuch applications as Microsoft Word,Excel and outlook.12
13Example of computer virusI LOVE YOU• VBS/LoveLetter is a VBScript worm. Itspreads through e-mail as a chain letter.• This worm sends itself to email addresses inthe Microsoft Outlook address book and alsospreads to Internet chatrooms.• This worm overwrites files on local andremote drives, including files with theextensions .html, .c,.bat,.mp3 etc.
spyware• Spyware is a software which is installedin the computer to spy on the activitiesdone on the computer.• It tracks what all user does and reportsit to the central source. They are usedto spy either for legal purpose or illegalpurpose.14
spyware• How do spyware cause damage?1. They monitor information such as whatsites you visit or record keystrokeswhich can lead to identity thefts.2. Some spywares alter PC settings likeposition of your desktop icons etc.3. It can rob the PC of system speed andinternet access efficiency.16
Adware• These are programs that deliverunwanted ads to computer(in the formof pop-ups).17
Adware• How do adware damage computer?1. Adware tracks the information just likespyware.2. When adware infects the computer, wewill receive frequent pop-upsappearing out of nowhere.3. The appearing of large number of ads,the PC starts to slow down.18
Spamming• Spamming refers to sending of bulk-mail by an identified or unidentifiedsource. The attacker keeps on sendingbulk mail to various accounts until mailserver runs out of disk space.19
Spamming• How do spams damage computer?1. Spam messages circulating acrossinternet disrupt email delivery & systemperformance.2. Spams eats up time.3. Spam messages contain fraud materialand can even spread viruses.20
PC Intrusion• Every PC connected to Internet aretarget of hackers. Hackers constantlyattack computers.21
PC Intrusion• How can it damage the system?1. Sweeper attack- Hackers use it todelete all the data in the system.2. Denial of service- Thais attack eats upall the resources of system and systemor application doesn’t work.3. Password guessing- Hackers crack orguess passwords of account to gainentry into remote computer systems.22
Solutions to computerthreats• The computer security protects thecomputer through threats by takingactions or taking prevention. There aretwo solutions to these threats-1. Active Protection2. Preventive Maesures23
Continued…• Active Protection- Installing and usingantivirus that includes Internet security-which includes protection againstviruses, spyware & PC intrusion.• Preventive measures- Even thoughsecurity programs detect & eliminatethreats but we should help preventthese issues from ever arising.24
Continued…• Solutions to viruses, adware,spyware1. Active protection• Use Anti-virus and Anti-spywaresoftware.• Download updates regularly.• Run frequent full-system scans.25
2. Preventive measures• Keep your system up-to-date.• Use caution when downloading files onthe internet.• Be careful with email.• Disable Cookies, if possible.26Continued…
• Solutions to Spam1. Active Protection:-Methods used byanti-spam software-(a)Sender FilteringDigital CertificatesDigital Signatures(b)Keyword Filtering27Continued…
Solutions to PC intrusion:-AuthorizationAuthenticationFirewall28Continued…