SlideShare a Scribd company logo
1 of 18
INTRODUCTION OF COMPUTER
SECURITY
COMPUTER SECRITY
o Computer and network security was not at all well
known,even about 12 years ago
o Today ,it is something everyone is aware of the need ,but nit
sure what is really means
o Interesting topic of threads ,counter measures
risks,stories,events and paranoia
MEDIA STORIES
o Consumers are bombarded with media reports narrating
dangers of the online world
o IDENTITY THEFT
o EMBEZZIEMENT AND FRAUD
o CREDIT CARD THEFT
o CORPORATE LOSS
GOALS OF COMPUTER SECURITY
o INTEGRITY
o Guarantee that the data is what we except
o CONFIDENTIALITY
o The information must just be accessible to the
authorized people
o RELIABILITY
o Computer should work without having unexpected
problems
o AUTHENTICATION
o Guarantee that only authorized persons can access to
the resource
SECURITY BASICS
WHAT DOES IT MEANS TO BE SECURE ????
o “Include protection of information from theft or corruption
or the preservation of availability as defined in the security
policy.”
o TYPES OF SECURITY
o Network security
o System and software security
o Physical security
o Software cannot protect software (may be hardware can )
o Networks can be protected better than software
SOME OF TYPES ATTACK
SOME COMMON ATTACKS
Network attacks
o Packet sniffing man –in –the middle, DNS hacking
Web attacks
o Phishing , SQL injection ,cross site scripting
OS , Application and software attacks
o Virus , trojans , worms , rootkits , buffer overflow
Social Engineering
o (NOT social networking)
NETWORK ATTACKS
o PACKET SNIFFING
o Internet traffic consists of the data “PACKETS” an
these can be “SNIFFED”
o Leads to other attacks such as password sniffing
,cookie stealing session hijacking information
technology
o MAN IN THE MIDDLE
o Insert a router in the path between client and server
and change the packet as they pass through
o DNS HIJACKING
o Insert malicious routers in DNS tablets TO send
traffic for genuine sites to malicious sites
WEB ATTACKS
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security

More Related Content

What's hot

Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measureshazirma
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7AfiqEfendy Zaen
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Network Security
Network SecurityNetwork Security
Network SecurityJoe Baker
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutionshassanmughal4u
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measuresjoy grace bagui
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationhamzakareem2
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research PaperPankaj Jha
 

What's hot (20)

Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Network security
Network securityNetwork security
Network security
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Hardware Security
Hardware SecurityHardware Security
Hardware Security
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 

Similar to Introduction of computer security

E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityS.M. Towhidul Islam
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber securityJetking
 
Network security
Network securityNetwork security
Network securitytoamma
 
Internet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security ConcernsInternet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security ConcernsAkshay Jain
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security andIaetsd Iaetsd
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
cyber security services | MasGlobal Services
cyber security services | MasGlobal Servicescyber security services | MasGlobal Services
cyber security services | MasGlobal ServicesMas Global Services
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security pptGryffin EJ
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptxssuser84f16f
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityzaarahary
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
Basic of Information Security
Basic of Information SecurityBasic of Information Security
Basic of Information SecurityPotato
 

Similar to Introduction of computer security (20)

E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Network security
Network securityNetwork security
Network security
 
Internet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security ConcernsInternet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security Concerns
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
cyber security services | MasGlobal Services
cyber security services | MasGlobal Servicescyber security services | MasGlobal Services
cyber security services | MasGlobal Services
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Basic of Information Security
Basic of Information SecurityBasic of Information Security
Basic of Information Security
 

Introduction of computer security

  • 2. COMPUTER SECRITY o Computer and network security was not at all well known,even about 12 years ago o Today ,it is something everyone is aware of the need ,but nit sure what is really means o Interesting topic of threads ,counter measures risks,stories,events and paranoia
  • 3. MEDIA STORIES o Consumers are bombarded with media reports narrating dangers of the online world o IDENTITY THEFT o EMBEZZIEMENT AND FRAUD o CREDIT CARD THEFT o CORPORATE LOSS
  • 4. GOALS OF COMPUTER SECURITY o INTEGRITY o Guarantee that the data is what we except o CONFIDENTIALITY o The information must just be accessible to the authorized people o RELIABILITY o Computer should work without having unexpected problems o AUTHENTICATION o Guarantee that only authorized persons can access to the resource
  • 5. SECURITY BASICS WHAT DOES IT MEANS TO BE SECURE ???? o “Include protection of information from theft or corruption or the preservation of availability as defined in the security policy.” o TYPES OF SECURITY o Network security o System and software security o Physical security o Software cannot protect software (may be hardware can ) o Networks can be protected better than software
  • 6. SOME OF TYPES ATTACK SOME COMMON ATTACKS Network attacks o Packet sniffing man –in –the middle, DNS hacking Web attacks o Phishing , SQL injection ,cross site scripting OS , Application and software attacks o Virus , trojans , worms , rootkits , buffer overflow Social Engineering o (NOT social networking)
  • 7. NETWORK ATTACKS o PACKET SNIFFING o Internet traffic consists of the data “PACKETS” an these can be “SNIFFED” o Leads to other attacks such as password sniffing ,cookie stealing session hijacking information technology o MAN IN THE MIDDLE o Insert a router in the path between client and server and change the packet as they pass through o DNS HIJACKING o Insert malicious routers in DNS tablets TO send traffic for genuine sites to malicious sites