SlideShare a Scribd company logo
1 of 11
SECURITY &
ETHICS
Online Session 2021
Topics to be covered
■ Security of data
■ Security risks and prevention methods
■ Viruses, definition, types and prevention methods
■ Hacking, definition, prevention methods
■ Cracking, definition, prevention methods
■ Difference between hacking and cracking
Why do we need security of data?
Computer security is the protection of computers from
unauthorized access and the protection of data from loss,
deletion, change and corruption. This helps maintain the
value of the data.
Security risks (offline)
 Human error
 Theft
 Physical causes
 Power failure
 Hardware failure
 Misplacing portable media
Prevention methods
a. Backups:
It is a copy of the data being used that can be kept incase of data loss.
Storage devices for data backup include: magnetic media, optical media, cloud storage
b. Verifications:
It is a check that asks the user to confirm whether or not they wish to go ahead with an
instruction.
c. Archived data:
It is data that is no longer needed for immediate processing, but needs to be kept.
Security threats (online)
Viruses:
Meaning:
 Program or program code that can replicate/ copy itself with the intention of deleting or
corrupting files, or cause the computer to malfunction.
Effects:
 Can cause the computer to crash, stop functioning normally or become unresponsive.
 Can delete files/ data
 Can corrupt files/data
Risk Mitigation:
 Antivirus software
 don’t use software from unknown sources
 be careful when opening emails/ attachments from unknown senders.
Types of Viruses
■ A worm is a program that actively transmits itself over a network to infect other computers.
■ A Trojan horse is any program that invites the user to run it, concealing harmful or malicious code.
■ A Boot Virus copies the virus code in the boot sector.
■ A CryptoLocker encrypts the files on a user's hard drive, then prompts them to pay a ransom to the
developer in order to receive the decryption key.
■ A shortcut virus is a shared computer virus that hides your files and replaces them with shortcuts with
the same file name. When you click on the shortcuts, the virus replicates itself and further infects your
drive.
Security threats (online) (cont’d)
Hacking:
Meaning:
 act of gaining illegal access to a computer system.
 White hat is ethical hacking whereas Black hat is illegal hacking
Effects:
 can lead to identity theft or gaining personal information
 data can be deleted, changed or corrupted
Risk mitigation:
 Firewalls
 using strong passwords and user ids
 anti-hacking software
Cracking:
Meaning:
 Commonly applied to the files used in software cracking programs, which enables illegal copying
and the use of commercial software by breaking or cracking various registration and copy-
protection techniques.
 It enables editing a program source code in a software so that the code can be exploited or
changed for a specific purpose.
Effects:
 exposed to invisible viruses and malware.
 Some cracked versions can contain bugs and could lead to processor performance being effected
 Software instability
Risk mitigation:
 Encryption of software code
 Create stronger passwords
Security threats (online) (cont’d)
Difference between Hacking and Cracking:
■ Hacking is breaking into a computer system to steal personal data without
the owner’s consent or knowledge (e.g. to steal a password file).
■ Cracking is where someone edits a program source code so that the code
can be exploited or changed for a specific purpose. This is usually done
for a malicious purpose (e.g. legitimate software could be altered by a
cracker to perform a different task e.g. send a user to a specific website).
■ Essentially, hacking isn’t necessarily harmful whilst cracking is ALWAYS
totally illegal and is potentially very damaging.

More Related Content

Similar to SECURITY AND ETHICS.pptx

Computer security
Computer securityComputer security
Computer securityfiza1975
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITYKak Yong
 
How To Protect Your Computer
How To Protect Your ComputerHow To Protect Your Computer
How To Protect Your ComputerDom Cole
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2smktsj2
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptxKhristine Botin
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 

Similar to SECURITY AND ETHICS.pptx (20)

Computer security
Computer securityComputer security
Computer security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet security
Internet securityInternet security
Internet security
 
cyber security
cyber security cyber security
cyber security
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
 
How To Protect Your Computer
How To Protect Your ComputerHow To Protect Your Computer
How To Protect Your Computer
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2
 
Slideshare is
Slideshare isSlideshare is
Slideshare is
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

SECURITY AND ETHICS.pptx

  • 2. Topics to be covered ■ Security of data ■ Security risks and prevention methods ■ Viruses, definition, types and prevention methods ■ Hacking, definition, prevention methods ■ Cracking, definition, prevention methods ■ Difference between hacking and cracking
  • 3. Why do we need security of data? Computer security is the protection of computers from unauthorized access and the protection of data from loss, deletion, change and corruption. This helps maintain the value of the data.
  • 4. Security risks (offline)  Human error  Theft  Physical causes  Power failure  Hardware failure  Misplacing portable media
  • 5. Prevention methods a. Backups: It is a copy of the data being used that can be kept incase of data loss. Storage devices for data backup include: magnetic media, optical media, cloud storage b. Verifications: It is a check that asks the user to confirm whether or not they wish to go ahead with an instruction. c. Archived data: It is data that is no longer needed for immediate processing, but needs to be kept.
  • 6.
  • 7. Security threats (online) Viruses: Meaning:  Program or program code that can replicate/ copy itself with the intention of deleting or corrupting files, or cause the computer to malfunction. Effects:  Can cause the computer to crash, stop functioning normally or become unresponsive.  Can delete files/ data  Can corrupt files/data Risk Mitigation:  Antivirus software  don’t use software from unknown sources  be careful when opening emails/ attachments from unknown senders.
  • 8. Types of Viruses ■ A worm is a program that actively transmits itself over a network to infect other computers. ■ A Trojan horse is any program that invites the user to run it, concealing harmful or malicious code. ■ A Boot Virus copies the virus code in the boot sector. ■ A CryptoLocker encrypts the files on a user's hard drive, then prompts them to pay a ransom to the developer in order to receive the decryption key. ■ A shortcut virus is a shared computer virus that hides your files and replaces them with shortcuts with the same file name. When you click on the shortcuts, the virus replicates itself and further infects your drive.
  • 9. Security threats (online) (cont’d) Hacking: Meaning:  act of gaining illegal access to a computer system.  White hat is ethical hacking whereas Black hat is illegal hacking Effects:  can lead to identity theft or gaining personal information  data can be deleted, changed or corrupted Risk mitigation:  Firewalls  using strong passwords and user ids  anti-hacking software
  • 10. Cracking: Meaning:  Commonly applied to the files used in software cracking programs, which enables illegal copying and the use of commercial software by breaking or cracking various registration and copy- protection techniques.  It enables editing a program source code in a software so that the code can be exploited or changed for a specific purpose. Effects:  exposed to invisible viruses and malware.  Some cracked versions can contain bugs and could lead to processor performance being effected  Software instability Risk mitigation:  Encryption of software code  Create stronger passwords Security threats (online) (cont’d)
  • 11. Difference between Hacking and Cracking: ■ Hacking is breaking into a computer system to steal personal data without the owner’s consent or knowledge (e.g. to steal a password file). ■ Cracking is where someone edits a program source code so that the code can be exploited or changed for a specific purpose. This is usually done for a malicious purpose (e.g. legitimate software could be altered by a cracker to perform a different task e.g. send a user to a specific website). ■ Essentially, hacking isn’t necessarily harmful whilst cracking is ALWAYS totally illegal and is potentially very damaging.