SlideShare a Scribd company logo
1 of 6
INSECURITY BLANKET
Is Your Computer Really Safe?
INSECURITY BLANKET -
CONTINUED
If you do, rest assured ,unless you have a cyber-
security expert living at your house, your computer is
as safe as TARGET’S or YAHOO or the NSA computers
INSECURITY BLANKET -
CONTINUED
were before and AFTER they were breached…
First, let’s examine why you think your computer is
safe:
INSECURITY BLANKET -
CONTINUED
• If you are at home, your computer is more
vulnerable from attack from the outside
• If your computer is at your place of employment,
the vulnerability is from inside
INSECURITY BLANKET -
CONTINUED
WHY!
• On the job, users think they are “protected” by
expensive hardware and software based “firewalls”
and network software that creates an “invisible”
network called a subnet
MBOOKBINDER@pccc.edu
INSECURITY BLANKET -
CONTINUED
• If you are at home, your computer is more
vulnerable from attack from the outside
• If your computer is at your place of employment,
the vulnerability is from inside

More Related Content

What's hot

Transnational railway security overview
Transnational railway security overviewTransnational railway security overview
Transnational railway security overviewEddie Thompson
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamMohammed Adam
 
Introduction of computer security
Introduction of computer securityIntroduction of computer security
Introduction of computer securitySoundaryaB2
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeAVG Technologies AU
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013salleh1n
 
Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Samwed Jain
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer SystemManesh T
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presencegueste0b5fe
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpointcarlyxxjo55
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Appsprimomh
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Teeth presentation by Nathan Carver
Teeth presentation by Nathan CarverTeeth presentation by Nathan Carver
Teeth presentation by Nathan CarverBeMyApp
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 

What's hot (19)

Transnational railway security overview
Transnational railway security overviewTransnational railway security overview
Transnational railway security overview
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Introduction of computer security
Introduction of computer securityIntroduction of computer security
Introduction of computer security
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013
 
Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)
 
Internet security
Internet securityInternet security
Internet security
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Computer security
Computer securityComputer security
Computer security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpoint
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Information security
Information securityInformation security
Information security
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Teeth presentation by Nathan Carver
Teeth presentation by Nathan CarverTeeth presentation by Nathan Carver
Teeth presentation by Nathan Carver
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 

Viewers also liked

Documentary proposal
Documentary proposal Documentary proposal
Documentary proposal Supermesh21
 
Talent Management Brochure
Talent Management BrochureTalent Management Brochure
Talent Management BrochureHenry Noteman
 
IntJouCompAppl
IntJouCompApplIntJouCompAppl
IntJouCompApplTim Minor
 
IJCB2014 Multi Modal Biometrics for Mobile Authentication final version
IJCB2014 Multi Modal Biometrics for Mobile Authentication final versionIJCB2014 Multi Modal Biometrics for Mobile Authentication final version
IJCB2014 Multi Modal Biometrics for Mobile Authentication final versionHagai Aronowitz
 
Bab ii matematika
Bab ii matematikaBab ii matematika
Bab ii matematikaFirda_123
 
MoPals Investor Presentation
MoPals Investor PresentationMoPals Investor Presentation
MoPals Investor PresentationAlex Haditaghi
 

Viewers also liked (12)

Documentary proposal
Documentary proposal Documentary proposal
Documentary proposal
 
Talent Management Brochure
Talent Management BrochureTalent Management Brochure
Talent Management Brochure
 
IntJouCompAppl
IntJouCompApplIntJouCompAppl
IntJouCompAppl
 
IJCB2014 Multi Modal Biometrics for Mobile Authentication final version
IJCB2014 Multi Modal Biometrics for Mobile Authentication final versionIJCB2014 Multi Modal Biometrics for Mobile Authentication final version
IJCB2014 Multi Modal Biometrics for Mobile Authentication final version
 
Pelajaran4
Pelajaran4Pelajaran4
Pelajaran4
 
Why MyCFO
Why MyCFOWhy MyCFO
Why MyCFO
 
Superyacht Article
Superyacht ArticleSuperyacht Article
Superyacht Article
 
Pelajaran5
Pelajaran5Pelajaran5
Pelajaran5
 
Bab ii matematika
Bab ii matematikaBab ii matematika
Bab ii matematika
 
Drums set1
Drums set1Drums set1
Drums set1
 
MoPals Investor Presentation
MoPals Investor PresentationMoPals Investor Presentation
MoPals Investor Presentation
 
Artikel Ruang Seduh by Ragil
Artikel Ruang Seduh by RagilArtikel Ruang Seduh by Ragil
Artikel Ruang Seduh by Ragil
 

Similar to Is Your Computer Really Safe? Examining Common Misconceptions

Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systemsaissa benyahya
 
The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial ThingsSenrio
 
What we do
What we doWhat we do
What we dobcolbeck
 
Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Windows troubleshooting
Windows troubleshootingWindows troubleshooting
Windows troubleshootingpetertrevino
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Positive Hack Days
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinalmordannon
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Finalmordannon
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
$HOME Sweet $HOME SANSFIRE Edition
$HOME Sweet $HOME SANSFIRE Edition$HOME Sweet $HOME SANSFIRE Edition
$HOME Sweet $HOME SANSFIRE EditionXavier Mertens
 

Similar to Is Your Computer Really Safe? Examining Common Misconceptions (20)

Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
MADS6638
MADS6638MADS6638
MADS6638
 
Senior Education
Senior EducationSenior Education
Senior Education
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial Things
 
What we do
What we doWhat we do
What we do
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Internet
InternetInternet
Internet
 
Wireless security
Wireless securityWireless security
Wireless security
 
Internet security
Internet securityInternet security
Internet security
 
Windows troubleshooting
Windows troubleshootingWindows troubleshooting
Windows troubleshooting
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
$HOME Sweet $HOME SANSFIRE Edition
$HOME Sweet $HOME SANSFIRE Edition$HOME Sweet $HOME SANSFIRE Edition
$HOME Sweet $HOME SANSFIRE Edition
 

Is Your Computer Really Safe? Examining Common Misconceptions

  • 1. INSECURITY BLANKET Is Your Computer Really Safe?
  • 2. INSECURITY BLANKET - CONTINUED If you do, rest assured ,unless you have a cyber- security expert living at your house, your computer is as safe as TARGET’S or YAHOO or the NSA computers
  • 3. INSECURITY BLANKET - CONTINUED were before and AFTER they were breached… First, let’s examine why you think your computer is safe:
  • 4. INSECURITY BLANKET - CONTINUED • If you are at home, your computer is more vulnerable from attack from the outside • If your computer is at your place of employment, the vulnerability is from inside
  • 5. INSECURITY BLANKET - CONTINUED WHY! • On the job, users think they are “protected” by expensive hardware and software based “firewalls” and network software that creates an “invisible” network called a subnet MBOOKBINDER@pccc.edu
  • 6. INSECURITY BLANKET - CONTINUED • If you are at home, your computer is more vulnerable from attack from the outside • If your computer is at your place of employment, the vulnerability is from inside