• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Computer Security
 
  • 1,913 views

Overview of Computer Security

Overview of Computer Security
Details about the Various threats and computer viruses.

Statistics

Views

Total Views
1,913
Views on SlideShare
1,908
Embed Views
5

Actions

Likes
1
Downloads
75
Comments
0

2 Embeds 5

http://www.slideshare.net 4
http://www.lmodules.com 1

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Computer Security Computer Security Presentation Transcript

    • Computer Security Prepared By : Binay Tiwari
    •  
    • Outline
      • IS Vulnerability
      • Types of Computer Crime
      • Computer Security
      • Computer Security Requirements
      • Computer Crime by UnAuthorized Users.
      • Potentially Malicious computer Programs.
    • IS Vulnerability
      • Financial institutions and banks
      • Internet service providers
      • Pharmaceutical companies
      • Government and defense agencies
      • Contractors to various government agencies
      • Multinational corporations
      • ANYONE ON THE NETWORK
    • Types of Computer Crimes
      • Hacking
      • Phishing
      • Computer Viruses
      • Cyber stalking
      • Identity Theft
    • Computer Security
      • Computer security is a branch of technology known as information security as applied to computers and networks.
      • . The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users
    • Computer Security Requirements
      • Secrecy
      • Integrity
      • Availability
      • Authenticity
      • Non-repudiation
      • Access control
    • Potentially Malicious computer Programs
      • Malicious Software-malware
      • Viruses
      • Worms
      • Trojans
    • Computer Crime Through Unauthorized access
      • Social Engineering
      • Cracking Passwords
      • THANK YOU