Your SlideShare is downloading. ×
Home Computer Security Presentation 1 Of 2
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Home Computer Security Presentation 1 Of 2

1,575
views

Published on

I hope you will find this brief presentation an enjoyable and useful

I hope you will find this brief presentation an enjoyable and useful


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,575
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Heriot-Watt University
    Tutor: Josie Pilcher
    Date: 07/06/2006
    Home Computer Security
    By: Mohammed A. Wahig Al-Sahli
  • 2. Home Computer Security
    Heriot-Watt University
    • Home Computer Data is at Risk
    • 3. Computer Security Risk Management
    • 4. Home Computer Network and the Internet
    • 5. Network Connection Requirements
    • 6. Computer Ports and Address
    • 7. Common Security Threats against Home Computer
    • 8. Protecting Home Computer
    • 9. the Main steps to Protect Home Computer Data
    • 10. Conclusions
  • Home Computer Security
    Heriot-Watt University
    Home Computer Data is at Risk
    The Risk is the exposure to loss or possible injury with information security (Ruth and Mudson 2003) .
    A Threat to information security is any activity that represents possible danger to the user information(Ruth and Mudson 2003) .
    A Vulnerability is a weakness in user information security that could be exploited by a threat or it is a weakness in user’ operating systems (Ruth and Mudson 2003) .
  • 11. Home Computer Security
    Heriot-Watt University
    Home Computer Data is at Risk
    • There are many users who do not realize that they need to pay attention to their computer security (Rogers, 2002).
    • 12. There are a growing number of sources that can put home computer data at risk (Nash, 2004).
    • 13. WindowsXP is the most popular operating system for home computers according to W3 School Web Site although “Windows XP, the most insecure computer operating system ever invented” (Walker, 2005, P1).
  • Home Computer Security
    Heriot-Watt University
    Home Computer Data is at Risk
  • 14. Home Computer Security
    Heriot-Watt University
    Home Computer Data is at Risk
    Malicious Code (2004/2005)-LinuxBy Kaspersky Web Site
  • 15. Home Computer Security
    Confidentiality
    Heriot-Watt University
    Integrity
    Availability
    Computer Security Risk Management
    • There are three aims of computer security; they are Confidentiality, Integrity, and Availability which must be protected. (Ruth, and Mudson, 2003).
    This term is referred to as C-I-A triad
  • 16. Home Computer Security
    Heriot-Watt University
    Computer Security Risk Management
    • According to Ruth and Mudson (2003) “computer users could minimize risk by identifying vulnerabilities, threats, and the potential risks and creating mitigation plan for those risks. Mitigation is defined as making something less harmful or less painful”.
    the Computer Security Risk Management
  • 17. Home Computer Security
    Heriot-Watt University
    Home Computer Network and the Internet
    • Basically, a network is two computers or more connect together for communications, sharing some data, or sharing some sources such as printers, scanners, or Internet connection(Ruth, & Mudson, 2003).
    • 18. According to Roark and Devine (2002)networks can be categorized
    to:
    Server-based networks
    Enterprise networks
    Peer-to-Peer networks
    which is used commonly for home computers.
  • 19. Home Computer Security
    Heriot-Watt University
    Home Computer Network and the Internet
    • Network Connection Requirements
    Client Operating Systems such as MS Windows XP.
    Server Operating Systems such as MS Windows Server 2003.
    A Network Interface Card (a NIC).
    Networking Protocols which means a set of rules that controls a network exchanging data between the nodes (Roark and Devine, 2002).
    The connection device such as Hub, Switch, or Router.
  • 20. Home Computer Security
    Heriot-Watt University
    Home Computer Network and the Internet
    • Computer Ports and Address
    • 21. Each device connected to the network has a unique
    address called an IP address. (for example: 192.127.12.108 )
    • each program on the computer can send or receive data
    over the Internet deals with a specific Port.
  • 22. Home Computer Security
    Heriot-Watt University
    Common Security Threats against Home Computer
    There is a variety of malicious codes and intruders activates that threaten computer security.
    • Malicious Code Programs (Malware)
    • 23. Viruses:
    • 24. can be replicated by someone.
    • 25. can not replicate itself.
    • 26. can destroy data, crash systems
  • Home Computer Security
    Heriot-Watt University
    Common Security Threats against Home Computer
    • Malicious Code Programs (Malware)
    • 27. Worms:
    • 28. can be replicated by someone.
    • 29. can propagate itself.
    • 30. can destroy data, crash systems.
    • 31. Spywares /Adwares:
    • 32. can open some ports on a victim system .
    • 33. can give access permission for an Intruder.
    • 34. can monitor a user’s activities and report the
    results to an Intruders.
  • 35. Home Computer Security
    Heriot-Watt University
    Common Security Threats against Home Computer
    • Hacking Strategies and Tools
    • 36. Phishing :
    • 37. Spoofing
  • Home Computer Security
    Heriot-Watt University
    Protecting Home Computer
    • the Main steps to Protect Home Computer Data
    • 38. Strong Computer System
    • 39. Intelligent and Careful User
    • 40. Strong Computer Security Tools
  • Home Computer Security
    Heriot-Watt University
    Conclusions
    • This research indicates that home computer data is at risk. Therefore, users should pay attention to their computer security requirements.
  • Home Computer Security
    Heriot-Watt University
    Thank You
    ?