This document discusses computer security and provides information on various topics related to it. It begins by defining computer security as a set of actions, tools, and devices that provide integrity, confidentiality, and availability of a computer system. It then discusses active security techniques like using strong passwords and encryption. Malware threats like viruses, worms, Trojans, and spyware are explained. The document also covers computer security software like antivirus and firewall programs, as well as hardware. It concludes by providing tips for safe web browsing and smartphone use, and highlights recent news about cyberattacks.
2. Index
Slide 1: Computer security.
Slide 2: Active and passive security.
Slides 3,4 & 5: Malware and silent threats.
Slide 6 & 7: Computer security software.
Slide 8: Web Security.
Slide 9: News related to cybersecurity or computer attacks.
3. Computer security
Set of actions, tools and devices. Its objective is to provide a computer system with
integrity, confidentiality and availability.
Protect us from:
● Ourselves
● Accidents and breakdowns
● Intrusive users
● Malicious software and malware
4. Some active security techniques are:
-Use an adequate password.
-Encrypt your data.
-Use a security I.T. software.
Active and passive security
Some passive security techniques are:
-Use an adequate hardware.
-Back up your data.
5. Malware and silent threats
Virus: program in the PC without the user’s knowledge.
Worms: infects all nodes on a computer network. Accompany malicious emails.
Spies: programme installed in the computer without user's knowledge.
Trojans: small application that has an input to our computer.
6. There are two types of Fraud by social
engineering.
-Phishing: Consists of asking for
confidential information persuading people
with money or other stuff.
-Rogue software: It’s a fake antivirus
system that contains a virus.
Malware and silent threats
Some applications alter the way we access
internet. They make us navigate through
fake websites and use telephone billing.
The different applications are:
-Dialer: Makes calls that give economic
benefits to the creator of the modem and
makes the user lose money. This can be
avoid using an ADSL router.
-Pharming: Impersonates the web pages to
get bank data.
-Hijacking: Consists of hijacking any
computer element.
7. Malware and silent threats
Spam: bulk email marketing
Keylogger: record every keystroke made by a user.
Obtaining sensitive information (passwords, bank data, etc)
New mobile devices: appearance of new mobile devices makes malware grow up.
8. Computer security hardware
Antivirus: detects malicious software, stops it from running, and removes it.
Compares the scanned files on the computer with their own signatures.
Heuristic systems: analyzes the internal code of the file and determines if it is a virus.
Levels: resident level or complete analisis level.
Firewall: allows or prohibits communication between the applications of our team and
the Network through the protocol TCP/IP.
Antispyware: collects information about our browsing habits and the ability to hijack our
browser home page by hijacking it by sending us to another page.
9. Computer security hardware
There are different security hardwares. The most recommendable Antivirus are:
For Windows: Avast and McAfee.
For Android: Avast Mobile.
For Apple: Sophos.
10. Web security
Advices for a safer navigation:
- Avoid suspicious web pages (http).
- Download from an official website.
- Update antivirus.
- Don’t click links from unknowns.
- Don’t put personal information.
- Inform about a product before buying.
- Be careful with .exe files.
- Use strong passwords.
- Read terms and services.
Advices for a safer smartphone:
- Use a strong password.
- Update the system.
- Install security programs.
- Don’t install unknown applications.
- Deactivate Bluetooth if it’s not in use.
- Avoid rooting.
- Avoid talking with unknowns.
11. News related to cybersecurity or computer
attacks.
● The cyber attacks of 2021 and those that will arrive in 2022
● 79% of Spaniards believe they are tracked by cybercriminals
● The UOC suffers a cyber attack that blocks its virtual campus
● Theft of more than 34 million dollars in Bitcoin and Ethereum occurs
● Ukraine denounces a large-scale cyber attack against the
government's computer system
● Drones, another option that cybercriminals use to steal
information
● The next-gen of cybercriminals starts from an early age