Computer security


Published on

Little analist about risk and threatens when you work with computer. And some tricks to make strong passwords.

Published in: Technology, News & Politics
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Computer security

  1. 1. Computer Securityby Antonio González Carcavilla
  2. 2. What is Computer Security?• is a branch of computer technology• known as “Information Security”• applied to computers and networks• the objective is to protect information and propertyfrom theft, corruption, or natural disaster
  3. 3. Risks & Threatening• Malware • Social Engineering
  4. 4. MalwareConsists of programming designed to:•disrupt or deny operation•gather information that leads to loss of privacy orexploitation•or gain unauthorized access to system resources
  5. 5. Examples of Malware• Virus• Trojans• Bots and botnets• Spyware
  6. 6. Virus• programs that alter the functioning of our computerwithout our knowledge obtaining or destroyinginformation• spread by direct contact or sharing the same medium
  7. 7. Trojans• viruses disguise as programs that supposedly dosomething but actually open a door on ourcomputer so it can be accessed from outside• his name comes from The Trojan Horse
  8. 8. Bots or Robots• is a type of trojan that use our computer toconnect to other infected computers (zombies)• the goal is create botnets or zombie networks• enables to send mass mailings without be detected
  9. 9. Spyware• collects small pieces of information about userswithout their knowledge• search for email adress, IP address, pages visited,...• the presence of spyware is typically hidden fromthe user, and can be difficult to detect
  10. 10. What is the propose?
  11. 11. How to get money?• directly:getting our bankaccess: phising• indirectly:renting zombie networksfor illegal purposes
  12. 12. Social Engineering• The art of manipulating people intoperforming actions or divulging confidentialinformation.
  13. 13. Examples of Social Engineering• Spam• Hoax• Phising
  14. 14. Spam• is the use of electronic messaging systems to sendunsolicited bulk messages indiscriminately• the most widely recognized form of spam ise-mail spam
  15. 15. Hoax• is a message warning the recipient of a non-existentcomputer virus threat• the message is usually a chain e-mail• are usually harmless
  16. 16. Phishing• a way of attempting to acquire information such asusernames, passwords, and credit card details bymasquerading as a trustworthy entity in an electroniccommunication
  17. 17. HowTo defend againstSocial Engineering?• don’t share relevant information• ensure that access the site you want• change the password regularly"If something seems too good to be true, it probably isn’t"
  18. 18. Safe PasswordsThere are two rules to enforce good passwords:• easy to remember• not a word in the dictionary
  19. 19. Safe PasswordsHow to create passwords easy to remember• find a personal “algorithm” for generatingobscure passwords• use sayings, poems or famous quotes
  20. 20. Safe PasswordsExample:Kill Two Birds With OneStone take the first letter of each word and change the numbers in figures:K___ 2 B____ W___ 1 S____“k2bw1s”
  21. 21. Safe PasswordsOther examples: “2habt1”  “1ysm7yw”  “2icb3iac” “abithiw2itb”  “str&stc”   “w&pup4ure”Two Heads Are Better Than OneOne years seeding makes seven years weedingTwo is company but three is a crowdA bird in the hand is worth two in the bushSpare the rod and spoil the childWalnuts and Pears You Plant For Your Ears
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.