SlideShare a Scribd company logo
1 of 23
Introduction of CCoommppuutteerr SSeeccuurriittyy.......... 
 What is Computer Security? 
• Lock the doors and windows and you are secure 
NOT 
• Call the police when you feel insecure 
Really? 
• Computers are powerful, programmable machines 
Whoever programs them controls them (and 
not you) 
• Networks are ubiquitous 
Carries genuine as well as malicious traffic 
End result: Complete computer security is 
unattainable, it is a cat and mouse game; 
Similar to crime vs. law enforcement.
Definition WWhhiicchh II DDeeffiinneedd AAbboouutt 
CCoommppuutteerr SSeeccuurriittyy…… 
 Computer Security is the protection of 
computing systems and the data that User store 
or access. 
TThhee DDeeffiinniittiioonn FFrroomm WWiikkiippeeddiiaa 
Computer security is information security as 
applied to computing devices such as 
computers and smart phones, as well as 
computer networks such as private and public 
networks, including the Internet.
GGooaallss OOff CCoommppuutteerr sseeccuurriittyy…….. 
• Integrity: 
Guarantee that the data is what we expect. 
•Confidentiality: 
The information must just be accessible to the 
authorized people. 
•Reliability: 
Computers should work without having unexpected 
problems. 
•Authentication: 
Guarantee that only authorized persons can access 
to the resources.
BBaassiicc SSeeccuurriittyy……
WWhhyy iiss CCoommppuutteerr SSeeccuurriittyy 
IImmppoorrttaanntt??
aallssoo……..
SSeeccuurriittyy AAttttaacckkss 
AAttttaacckk oonn tthhee ccoommppuutteerr ssyysstteemm iittsseellff 
assword guessing 
hishing 
poofing 
ack door 
uffer overflow 
HHaavvee yyoouu eevveerr eexxppeerriieenncceedd oonnee ooff tthheessee??
PPaasssswwoorrdd GGuueessssiinngg 
 Obvious 
PPhhiisshhiinngg 
 Trick users into revealing security information 
SSppooooffiinngg 
 Malicious user masquerades as authorized user 
BBaacckk ddoooorr 
 A backdoor is a program placed by a black-hacker 
that allows him to access a system. A 
backdoor have many functionalities such as 
keyboard-sniffer, display spying, etc.
BBuuffffeerr oovveerrffllooww 
 Defect that could cause a system to crash and 
leave the user with heightened privileges 
DDeenniiaall ooff sseerrvviiccee 
 Attach that prevents authorized user from 
accessing the system 
MMaann iinn tthhee mmiiddddllee 
 Network communication is intercepted in an 
attempt to obtain key data
MMoorree AAttttaacckkss…… 
1. Packet Sniffing (Internet traffic consists of data “packets”, and 
these can be “sniffed”) 
2. Man in the Middle(Insert a router in the path between client and 
server, and change the packets as they pass through) 
3. DNS hijacking(Insert malicious routes into DNS tables to send 
traffic for genuine sites to malicious sites) 
4. Phishing(An evil website pretends to be a trusted website) 
Example: 
1. You type, by mistake, “mibank.com” instead of “mybank.com” 
mibank.com designs the site to look like mybank.com so the user types 
in their info as usual 
2. BAD! Now an evil person has your info!
VViirruuss 
Piece of code that automatically reproduces itself. 
It’s attached to other programs or files, but 
requires user intervention to propagate. 
Attacks on Computer For Virus 
i. Infect Executable files 
ii. Infect Boot sectors 
iii. Infect Documents (macros), scripts (web pages), etc. 
Source of Virus 
It can be create itself in computer system. It also 
create with storage elements, mails, downloaded 
files or shared folders.
WWoorrmm 
Piece of code that automatically reproduces itself over the 
network. It doesn’t need the user intervention to 
propagate (autonomous). 
Attacks on Computer For Worm 
It infects computer via buffer overflow, file sharing, 
configuration errors and other vulnerabilities. 
What It search? 
It search Email addresses, DNS, IP, network 
neighborhood for hacking or Malicious 
programs Backdoor, DDoS agent, etc.
SSoocciiaall EEnnggiinneeeerriinngg 
•Manipulating a person or persons into 
divulging confidential information. 
 Would us also have to aware about this? 
1. Yes, cause Social engineers are a lot more cunning 
than you. 
2. It also can Happen with Corporate Executive & 
Most of theme are fooled by this hackers.
HHeerree’’ss aa ssmmaallll EExxaammppllee ooff SSoocciiaall 
eennggiinneeeerr’’ss wwoorrkk....
HHooww ccaann wwee pprrootteecctt oouurr 
CCoommppuutteerrss & UUss ffrroomm tthhiiss 
kkiinndd ooff tthhrreeaattss.... 
For computer access 
1. User knowledge (Name, password, PIN) 
2. Smart card (A card with an embedded memory chip 
used for identification) 
3. Biometrics (Human characteristics such as fingerprints, 
retina or voice patterns)
GGuuiiddeelliinnee FFoorr PPaasssswwoorrdd........ 
1. Easy to remember, hard to guess 
2. Don’t use family or pet names 
3. Don’t make it accessible 
4. Use combination uppercase/lowercase letters, 
digits and special characters 
5. Don’t leave computer when logged in 
6. Don’t ever tell anyone 
7. Don’t include in an email 
8. Don’t use the same password in lots of places
OOnn IInntteerrnneett 
CAPTCHA 
Software that verifies that the user is not another 
computer 
You have to look at a weird set of 
characters and key them back in. 
Why does this work?
iinnggeerr pprriinntt aannaallyysseerr
Some Other Techniques of 
Securing Computer.... 
Ensuring computer and network security 
i. Cryptography 
ii. Secure networks 
iii. Antivirus software 
iv. Firewalls 
In addition, users have to practice “safe 
computing” 
1. Not downloading from unsafe websites 
2. Not opening attachments 
3. Not trusting what you see on websites 
4. Avoiding Scams
CCrryyppttooggrraapphhyy 
Secret Codes 
 Encryption 
o Converting data to unreadable codes to prevent anyone form 
accessing this information. 
o Need a “key” to find the original data – keys take a few 
million-trillion years to guess. 
 Public keys 
An ingenious system of proving you know your password without 
disclosing your password. Also used for digital signatures. 
o Used heavily in SSL connections. 
 Hashing 
o Creating fingerprints of documents.
Conclusion 
Its not that easy to protect yourself or your computer 
from threats & attacks. But its not that much harder 
either. So just follow some rules & you are protected 
from this threats & attacks. 
Computer security is for protect the user. So we will 
follow the rules to protect ourselves.
Computer security

More Related Content

What's hot

Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricksSudhanshu Mishra
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Sumit Satam
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2mubeenm50
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hackingSainath Volam
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksSrikanth VNV
 
Website attack n defacement n its control measures
Website attack n defacement n its control measures Website attack n defacement n its control measures
Website attack n defacement n its control measures أحلام انصارى
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605RAKESH SHARMA
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness programNeel Kamal
 
Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorialiuvmtech
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 

What's hot (20)

Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Internet security
Internet securityInternet security
Internet security
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Hacking
Hacking Hacking
Hacking
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Security Threats
Security ThreatsSecurity Threats
Security Threats
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Website attack n defacement n its control measures
Website attack n defacement n its control measures Website attack n defacement n its control measures
Website attack n defacement n its control measures
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness program
 
Hacking Kishor
Hacking KishorHacking Kishor
Hacking Kishor
 
Web security
Web securityWeb security
Web security
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Viewers also liked

Application software
Application softwareApplication software
Application softwareKawsar Ahmed
 
e-bulletin-November2010
e-bulletin-November2010e-bulletin-November2010
e-bulletin-November2010Vivek kaser
 
The Health Benefits of Indian Food
The Health Benefits of Indian FoodThe Health Benefits of Indian Food
The Health Benefits of Indian Foododdjoker3810
 
Shapes shapes-everywhere
Shapes shapes-everywhereShapes shapes-everywhere
Shapes shapes-everywherekinderstars
 
Cognitive dissonance is a Good thing
Cognitive dissonance is a Good thingCognitive dissonance is a Good thing
Cognitive dissonance is a Good thingAditya Gupta
 
為你而讀_國家記憶
為你而讀_國家記憶為你而讀_國家記憶
為你而讀_國家記憶Po-ru Lee
 
Bet365 review
Bet365 review Bet365 review
Bet365 review mafsmafs
 
Holland vs Argentina Predictions
Holland vs Argentina PredictionsHolland vs Argentina Predictions
Holland vs Argentina Predictionsmafsmafs
 
法雅客攝影馬拉松記錄
法雅客攝影馬拉松記錄法雅客攝影馬拉松記錄
法雅客攝影馬拉松記錄Po-ru Lee
 
China air pollution season kicks off with a cough and a wheeze as coal plants...
China air pollution season kicks off with a cough and a wheeze as coal plants...China air pollution season kicks off with a cough and a wheeze as coal plants...
China air pollution season kicks off with a cough and a wheeze as coal plants...oddjoker3810
 

Viewers also liked (20)

Application software
Application softwareApplication software
Application software
 
Kimmy kangaroo
Kimmy kangarooKimmy kangaroo
Kimmy kangaroo
 
e-bulletin-November2010
e-bulletin-November2010e-bulletin-November2010
e-bulletin-November2010
 
The Health Benefits of Indian Food
The Health Benefits of Indian FoodThe Health Benefits of Indian Food
The Health Benefits of Indian Food
 
Shapes shapes-everywhere
Shapes shapes-everywhereShapes shapes-everywhere
Shapes shapes-everywhere
 
Lou lou moose
Lou lou mooseLou lou moose
Lou lou moose
 
Cognitive dissonance is a Good thing
Cognitive dissonance is a Good thingCognitive dissonance is a Good thing
Cognitive dissonance is a Good thing
 
Angely flores
Angely floresAngely flores
Angely flores
 
為你而讀_國家記憶
為你而讀_國家記憶為你而讀_國家記憶
為你而讀_國家記憶
 
Hippy hippo
Hippy  hippoHippy  hippo
Hippy hippo
 
Jenny jaguar
Jenny  jaguarJenny  jaguar
Jenny jaguar
 
Team building
Team buildingTeam building
Team building
 
Bet365 review
Bet365 review Bet365 review
Bet365 review
 
Victor vampire
Victor vampireVictor vampire
Victor vampire
 
Crazy camel
Crazy camelCrazy camel
Crazy camel
 
Holland vs Argentina Predictions
Holland vs Argentina PredictionsHolland vs Argentina Predictions
Holland vs Argentina Predictions
 
Daisy dragon
Daisy dragonDaisy dragon
Daisy dragon
 
法雅客攝影馬拉松記錄
法雅客攝影馬拉松記錄法雅客攝影馬拉松記錄
法雅客攝影馬拉松記錄
 
Farley fox
Farley foxFarley fox
Farley fox
 
China air pollution season kicks off with a cough and a wheeze as coal plants...
China air pollution season kicks off with a cough and a wheeze as coal plants...China air pollution season kicks off with a cough and a wheeze as coal plants...
China air pollution season kicks off with a cough and a wheeze as coal plants...
 

Similar to Computer security

The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking - Mark - Fullbright
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 

Similar to Computer security (20)

Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Computer security
Computer securityComputer security
Computer security
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Hamza
HamzaHamza
Hamza
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 

More from Kawsar Ahmed

System software is creating a modern world
System software is creating a modern world System software is creating a modern world
System software is creating a modern world Kawsar Ahmed
 
Algorithm Design Presentation
Algorithm Design PresentationAlgorithm Design Presentation
Algorithm Design PresentationKawsar Ahmed
 
Computer Networking
Computer NetworkingComputer Networking
Computer NetworkingKawsar Ahmed
 

More from Kawsar Ahmed (6)

Computer virus
 Computer virus Computer virus
Computer virus
 
System software is creating a modern world
System software is creating a modern world System software is creating a modern world
System software is creating a modern world
 
Algorithm Design Presentation
Algorithm Design PresentationAlgorithm Design Presentation
Algorithm Design Presentation
 
Flow chart
Flow chartFlow chart
Flow chart
 
mmmmmmm
mmmmmmmmmmmmmm
mmmmmmm
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 

Computer security

  • 1.
  • 2. Introduction of CCoommppuutteerr SSeeccuurriittyy..........  What is Computer Security? • Lock the doors and windows and you are secure NOT • Call the police when you feel insecure Really? • Computers are powerful, programmable machines Whoever programs them controls them (and not you) • Networks are ubiquitous Carries genuine as well as malicious traffic End result: Complete computer security is unattainable, it is a cat and mouse game; Similar to crime vs. law enforcement.
  • 3. Definition WWhhiicchh II DDeeffiinneedd AAbboouutt CCoommppuutteerr SSeeccuurriittyy……  Computer Security is the protection of computing systems and the data that User store or access. TThhee DDeeffiinniittiioonn FFrroomm WWiikkiippeeddiiaa Computer security is information security as applied to computing devices such as computers and smart phones, as well as computer networks such as private and public networks, including the Internet.
  • 4. GGooaallss OOff CCoommppuutteerr sseeccuurriittyy…….. • Integrity: Guarantee that the data is what we expect. •Confidentiality: The information must just be accessible to the authorized people. •Reliability: Computers should work without having unexpected problems. •Authentication: Guarantee that only authorized persons can access to the resources.
  • 6. WWhhyy iiss CCoommppuutteerr SSeeccuurriittyy IImmppoorrttaanntt??
  • 8. SSeeccuurriittyy AAttttaacckkss AAttttaacckk oonn tthhee ccoommppuutteerr ssyysstteemm iittsseellff assword guessing hishing poofing ack door uffer overflow HHaavvee yyoouu eevveerr eexxppeerriieenncceedd oonnee ooff tthheessee??
  • 9. PPaasssswwoorrdd GGuueessssiinngg  Obvious PPhhiisshhiinngg  Trick users into revealing security information SSppooooffiinngg  Malicious user masquerades as authorized user BBaacckk ddoooorr  A backdoor is a program placed by a black-hacker that allows him to access a system. A backdoor have many functionalities such as keyboard-sniffer, display spying, etc.
  • 10. BBuuffffeerr oovveerrffllooww  Defect that could cause a system to crash and leave the user with heightened privileges DDeenniiaall ooff sseerrvviiccee  Attach that prevents authorized user from accessing the system MMaann iinn tthhee mmiiddddllee  Network communication is intercepted in an attempt to obtain key data
  • 11. MMoorree AAttttaacckkss…… 1. Packet Sniffing (Internet traffic consists of data “packets”, and these can be “sniffed”) 2. Man in the Middle(Insert a router in the path between client and server, and change the packets as they pass through) 3. DNS hijacking(Insert malicious routes into DNS tables to send traffic for genuine sites to malicious sites) 4. Phishing(An evil website pretends to be a trusted website) Example: 1. You type, by mistake, “mibank.com” instead of “mybank.com” mibank.com designs the site to look like mybank.com so the user types in their info as usual 2. BAD! Now an evil person has your info!
  • 12. VViirruuss Piece of code that automatically reproduces itself. It’s attached to other programs or files, but requires user intervention to propagate. Attacks on Computer For Virus i. Infect Executable files ii. Infect Boot sectors iii. Infect Documents (macros), scripts (web pages), etc. Source of Virus It can be create itself in computer system. It also create with storage elements, mails, downloaded files or shared folders.
  • 13. WWoorrmm Piece of code that automatically reproduces itself over the network. It doesn’t need the user intervention to propagate (autonomous). Attacks on Computer For Worm It infects computer via buffer overflow, file sharing, configuration errors and other vulnerabilities. What It search? It search Email addresses, DNS, IP, network neighborhood for hacking or Malicious programs Backdoor, DDoS agent, etc.
  • 14. SSoocciiaall EEnnggiinneeeerriinngg •Manipulating a person or persons into divulging confidential information.  Would us also have to aware about this? 1. Yes, cause Social engineers are a lot more cunning than you. 2. It also can Happen with Corporate Executive & Most of theme are fooled by this hackers.
  • 15. HHeerree’’ss aa ssmmaallll EExxaammppllee ooff SSoocciiaall eennggiinneeeerr’’ss wwoorrkk....
  • 16. HHooww ccaann wwee pprrootteecctt oouurr CCoommppuutteerrss & UUss ffrroomm tthhiiss kkiinndd ooff tthhrreeaattss.... For computer access 1. User knowledge (Name, password, PIN) 2. Smart card (A card with an embedded memory chip used for identification) 3. Biometrics (Human characteristics such as fingerprints, retina or voice patterns)
  • 17. GGuuiiddeelliinnee FFoorr PPaasssswwoorrdd........ 1. Easy to remember, hard to guess 2. Don’t use family or pet names 3. Don’t make it accessible 4. Use combination uppercase/lowercase letters, digits and special characters 5. Don’t leave computer when logged in 6. Don’t ever tell anyone 7. Don’t include in an email 8. Don’t use the same password in lots of places
  • 18. OOnn IInntteerrnneett CAPTCHA Software that verifies that the user is not another computer You have to look at a weird set of characters and key them back in. Why does this work?
  • 20. Some Other Techniques of Securing Computer.... Ensuring computer and network security i. Cryptography ii. Secure networks iii. Antivirus software iv. Firewalls In addition, users have to practice “safe computing” 1. Not downloading from unsafe websites 2. Not opening attachments 3. Not trusting what you see on websites 4. Avoiding Scams
  • 21. CCrryyppttooggrraapphhyy Secret Codes  Encryption o Converting data to unreadable codes to prevent anyone form accessing this information. o Need a “key” to find the original data – keys take a few million-trillion years to guess.  Public keys An ingenious system of proving you know your password without disclosing your password. Also used for digital signatures. o Used heavily in SSL connections.  Hashing o Creating fingerprints of documents.
  • 22. Conclusion Its not that easy to protect yourself or your computer from threats & attacks. But its not that much harder either. So just follow some rules & you are protected from this threats & attacks. Computer security is for protect the user. So we will follow the rules to protect ourselves.