SlideShare a Scribd company logo
1 of 36
Computer Security:
Hackers and Viruses
1
2
Overview
•Introduction 
•Viruses
•Hackers
•Protecting
•Conclusion
3
Computer Security
• Definition
– is the protection of information systems from theft or
damage to the hardware, the software, and to the information
on them, as well as from disruption or misdirection of the
services they provide.
• Computer Security measures
– Data encryption
– Passwords
4
Overview
•Introduction
•Viruses 
•Hackers
•Protecting
•Conclusion
5
What is computer virus?
• Computer virus refers to a program which damages computer
systems and/or destroys or erases data files
• Virus is a small piece of program that can infect other programs
by modifying them to include a copy of itself.
6
Types of Computer Virus
• Time Bomb
• Logical Bomb
• Worm
• Boot Sector Virus
• Macros Virus
• Script Virus
• Trojan Virus
7
Time Bomb
• Software that is inherently malicious, such as viruses and
worms, often contain logic bombs that execute a certain
payload at a pre-defined time or when some other condition is
met.
• A time bomb is a virus program that performs an activity on a
particular date
8
Logical Bomb
• A logical bomb is a destructive program that performs an
activity when a certain action has occurred.
• Other way for the logic bomb is a piece of code intentionally
inserted into a software system that will set off a malicious
function when specified conditions are met.
• For example, a programmer may hide a piece of code that starts
deleting files (such as a salary database trigger), should they
ever be terminated from the company.
9
Worm Virus
• A worm is also a destructive program that fills a computer
system with self-replicating information, clogging the system so
that its operations are slowed down or stopped.
• A computer worm is a standalone malware computer program
that replicates itself in order to spread to other computers.
Often, it uses a computer network to spread itself, relying on
security failures on the target computer to access it.
10
Boot Sector Virus
• A boot sector virus infects boot sector of computers. During
system boot, boot sector virus is loaded into main memory and
destroys data stored in hard disk.
• Boot-sector viruses infect computer systems by copying code
either to the boot sector on a floppy disk or the partition table
on a hard disk. During startup, the virus is loaded into memory.
Once in memory, the virus will infect any non-infected disks
accessed by the system.
11
Macros Virus
• a macro virus is a virus that is written in a macro language: a
programming language which is embedded inside a software
application (e.g., word processors and spreadsheet applications).
• A macro virus is a computer virus that "infects" a Microsoft
Word or similar application and causes a sequence of actions to
be performed automatically when the application is started or
something else triggers it, macro virus is loaded into main
memory and destroys the data stored in hard disk.
12
Script Virus
• Commonly found script viruses are written using the Visual
Basic Scripting edition (VBS) and the JavaScript programming
languages.
• A Script Virus usually comes from webpage advertisements and
is therefore wide-spread.
13
Trojan Virus
• Trojan Horse is a destructive program. It usually pretends as
computer games or application software. If executed, computer
system will be damaged.
• Trojan Horse usually comes with monitoring tools and key
loggers.
• These actions can include:
• Deleting data
• Blocking data
• Modifying data
• Copying data
14
Overview
•Introduction
•Viruses
•Hackers 
•Protecting
•Conclusion
15
Definition
• Hacking generally refers to unauthorized intrusion into a
computer or a network. The person engaged in hacking
activities is known as a hacker. This hacker may alter system or
security features to accomplish a goal that differs from the
original purpose of the system.
• Hacking can also refer to non-malicious activities, usually
involving unusual or improvised alterations to equipment or
processes.
16
Types of Hackers
• White hat
– breaks security for non-malicious reasons, perhaps to test
their own security system or while working for a security
company which makes security software.
• Black hat
– a black hat hacker who violates computer security for little
reason beyond maliciousness or for personal gain . Black hat
hackers break in to secure networks to destroy data or make
the network unusable for those who are authorized to use the
network.
17
Types of Hackers (Cont.)
• Grey hat
– A grey hat hackers is a combination of a black hat and a
white hat hacker. A grey hacker may surf the internet and
hack in to a computer system for the sole purpose of
notifying the administrator that their system has a security
defect
– Ex: then they may offer to correct the defect for a fee
• Script Kiddie
– A script kiddie is some one who looks out to exploit
vulnerability with not so much as trying to gain access to
administrative or root access to the system
18
Types of Hackers (Cont.)
• Crackers
– Are the people aiming to create software tools that make it
possible to attack computer systems or crack the copy
protection of use-fee software. A crack is therefore an
executable program created to modify the original software
to as to remove its protection.
• Carder’s
Mainly attack chip card systems (particularly bank cards)
to understand how they work and to exploit their flaws. The term
carding refers to chip card piracy.
19
Why do Hackers Attack?
• Financial Gain
• Venting anger at a company or organization
• Terrorism
• Because they can!
Top 5 Powerful Hacking Tools
20
21
Wire Shark
• Network Mapping
• Steal Cookies
• Key Logging
• Phishing
• Men-in-the-Middel
22
AIRCRACK-NG
• Wi-Fi Hacker/Cracker
• Support All Version
• Show pass.txt
• Command Line User Interface
23
Meta Sploit
• Forensic Tester
• Trojan Creator
• Support 6+ OS
• Use With Steganography
24
Low Orbit Ion Cannon
• DDOS Attacker
• Recommend High Speed Internet
• Network Jammer
25
Social Engineer Toolkit
• Spear Phishing Attack Vector
• Website Attack Vector
• Infectious Media Generator
• Create Payload and Lister
• Mass Mailer Attack
• Anduino Based Attack Vector
• SMS Spoofing Attack Vector
• Wireless Access Point Attack Vector
• QR Code Generator Attack Vector
• Power Shell Attack Vector
• Third Party Module
26
Overview
•Introduction
•Viruses
•Hackers
•Protecting 
•Conclusion
27
Security Strategies
Firewall
– allows normal Web browser operations but prevents other
types of communication
– checks incoming data against a list of known sources
– data rejected if it does not fit a preset profile
28
Security Strategies (Cont.)
Network Sniffer
– displays network traffic data
– shows which resources employees use and Web sites they visit
– can be used to troubleshoot network connections and improve
system performance
29
Security Strategies (Cont.)
Antivirus Software
– detects and deletes known viruses
– Internet allows antivirus software to update itself to detect
newer viruses.
– Some popular anti-virus programs:
• Malware bytes
• McAfee
• Norton Utilities
• F-Secure
• Internet Guard Dog
30
Security Strategies (Cont.)
Data Backups
Organizations protect critical files by
– keeping a copy of programs and data in a safe place
– keep more than one backup of important databases and update
them on a set schedule
31
Helpful Hints to Avoid Viruses
• Obtain software only from trusted sources.
• Use a safe Web browser and e-mail client.
• Scan all newly-obtained disks, programs, and files.
32
Actions to prevent virus infection
• Always update your anti-virus software at least
weekly.
• Back up your important files and ensure that they can
be restored.
• Change the computer's boot sequence to always start
the PC from its hard drive
• Don't share Drive C: without a password and without
read-only restrictions.
• Empty floppy drives of diskettes before turning on
computers, especially laptops.
33
Actions to prevent virus infection
• Forget opening unexpected e-mail attachments, even if
they're from friends
• Get trained on your computer's anti-virus software and
use it.
• Have multiple backups of important files. This lowers
the chance that all are infected.
• Install security updates for your operating system and
programs as soon as possible.
• Jump at the chance to learn more about your computer.
This will help you spot viruses.
34
Overview
•Introduction
•Viruses
•Hackers
•Protecting
•Conclusion 
35
Conclusions
• Computer Security is a continuous battle
– As computer security gets tighter hackers are getting
smarter
36
The End
Any Questions?

More Related Content

What's hot

Introduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationIntroduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationAna Tan
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber CrimeDr Raghu Khimani
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber lawshreya sanghvi
 
Basic structure of computers
Basic structure of computersBasic structure of computers
Basic structure of computersKumar
 
SECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptSECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptDimpyJindal4
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 
Malware forensic
Malware forensicMalware forensic
Malware forensicSumeraHangi
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The LawSaimaRafiq
 

What's hot (20)

Introduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationIntroduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts Presentation
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Malware
MalwareMalware
Malware
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Cpu ppt cse
Cpu ppt cseCpu ppt cse
Cpu ppt cse
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Network Security
Network SecurityNetwork Security
Network Security
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
How the cpu works
How the cpu worksHow the cpu works
How the cpu works
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber law
 
Basic structure of computers
Basic structure of computersBasic structure of computers
Basic structure of computers
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Input devices
Input devicesInput devices
Input devices
 
SECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptSECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.ppt
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Computer security
Computer securityComputer security
Computer security
 
Malware forensic
Malware forensicMalware forensic
Malware forensic
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 

Similar to Computer security: hackers and Viruses

lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimenidhidgowda185
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewareAJAY VISHKARMA
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityGeevarghese Titus
 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfAsmaaLafi1
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptxmalikmuzammil2326
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 

Similar to Computer security: hackers and Viruses (20)

lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Thur Venture
Thur VentureThur Venture
Thur Venture
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Regression
RegressionRegression
Regression
 
Sangeetha Venture
Sangeetha VentureSangeetha Venture
Sangeetha Venture
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdf
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptx
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Cyber security
Cyber securityCyber security
Cyber security
 

More from Wasif Ali Syed

National Bank of Pakistan Internship Report.pdf
National Bank of Pakistan Internship Report.pdfNational Bank of Pakistan Internship Report.pdf
National Bank of Pakistan Internship Report.pdfWasif Ali Syed
 
Islamic Insurance or Takaful
Islamic Insurance or TakafulIslamic Insurance or Takaful
Islamic Insurance or TakafulWasif Ali Syed
 
Genetic Information Non Discrimination Act.pptx
Genetic Information Non Discrimination Act.pptxGenetic Information Non Discrimination Act.pptx
Genetic Information Non Discrimination Act.pptxWasif Ali Syed
 
Rules for Intangible Asset Recognition, Research and Development, Software De...
Rules for Intangible Asset Recognition, Research and Development, Software De...Rules for Intangible Asset Recognition, Research and Development, Software De...
Rules for Intangible Asset Recognition, Research and Development, Software De...Wasif Ali Syed
 
Financial Statement Analysis of Engro Fertilizers
Financial Statement Analysis of Engro FertilizersFinancial Statement Analysis of Engro Fertilizers
Financial Statement Analysis of Engro FertilizersWasif Ali Syed
 
Inferential Statistics.pptx
Inferential Statistics.pptxInferential Statistics.pptx
Inferential Statistics.pptxWasif Ali Syed
 
Introduction of Pshycology.ppt
Introduction of Pshycology.pptIntroduction of Pshycology.ppt
Introduction of Pshycology.pptWasif Ali Syed
 
Geometric Sequences and Series.ppt
Geometric Sequences and Series.pptGeometric Sequences and Series.ppt
Geometric Sequences and Series.pptWasif Ali Syed
 
Mobile, Online Marketing
Mobile, Online MarketingMobile, Online Marketing
Mobile, Online MarketingWasif Ali Syed
 
Maslow's Hirerachy Theory
Maslow's Hirerachy Theory Maslow's Hirerachy Theory
Maslow's Hirerachy Theory Wasif Ali Syed
 
Attention, factors of Attention
Attention, factors of AttentionAttention, factors of Attention
Attention, factors of AttentionWasif Ali Syed
 
Types and Forms of Business, Types of Accounting
Types and Forms of Business, Types of AccountingTypes and Forms of Business, Types of Accounting
Types and Forms of Business, Types of AccountingWasif Ali Syed
 
Risk and Return, Time value of Money and Credit Rating Agencies
Risk and Return, Time value of Money and Credit Rating AgenciesRisk and Return, Time value of Money and Credit Rating Agencies
Risk and Return, Time value of Money and Credit Rating AgenciesWasif Ali Syed
 
Difference Between Culture and Civilization
Difference Between Culture and CivilizationDifference Between Culture and Civilization
Difference Between Culture and CivilizationWasif Ali Syed
 

More from Wasif Ali Syed (20)

National Bank of Pakistan Internship Report.pdf
National Bank of Pakistan Internship Report.pdfNational Bank of Pakistan Internship Report.pdf
National Bank of Pakistan Internship Report.pdf
 
Islamic Insurance or Takaful
Islamic Insurance or TakafulIslamic Insurance or Takaful
Islamic Insurance or Takaful
 
KFC.pptx
KFC.pptxKFC.pptx
KFC.pptx
 
Genetic Information Non Discrimination Act.pptx
Genetic Information Non Discrimination Act.pptxGenetic Information Non Discrimination Act.pptx
Genetic Information Non Discrimination Act.pptx
 
Rules for Intangible Asset Recognition, Research and Development, Software De...
Rules for Intangible Asset Recognition, Research and Development, Software De...Rules for Intangible Asset Recognition, Research and Development, Software De...
Rules for Intangible Asset Recognition, Research and Development, Software De...
 
Financial Statement Analysis of Engro Fertilizers
Financial Statement Analysis of Engro FertilizersFinancial Statement Analysis of Engro Fertilizers
Financial Statement Analysis of Engro Fertilizers
 
Women Rights
Women RightsWomen Rights
Women Rights
 
Inferential Statistics.pptx
Inferential Statistics.pptxInferential Statistics.pptx
Inferential Statistics.pptx
 
Cost Audit
Cost AuditCost Audit
Cost Audit
 
Balance Sheet.pptx
Balance Sheet.pptxBalance Sheet.pptx
Balance Sheet.pptx
 
Introduction of Pshycology.ppt
Introduction of Pshycology.pptIntroduction of Pshycology.ppt
Introduction of Pshycology.ppt
 
Geometric Sequences and Series.ppt
Geometric Sequences and Series.pptGeometric Sequences and Series.ppt
Geometric Sequences and Series.ppt
 
Mobile, Online Marketing
Mobile, Online MarketingMobile, Online Marketing
Mobile, Online Marketing
 
Operating Cash Flows
Operating Cash FlowsOperating Cash Flows
Operating Cash Flows
 
Maslow's Hirerachy Theory
Maslow's Hirerachy Theory Maslow's Hirerachy Theory
Maslow's Hirerachy Theory
 
Attention, factors of Attention
Attention, factors of AttentionAttention, factors of Attention
Attention, factors of Attention
 
Types and Forms of Business, Types of Accounting
Types and Forms of Business, Types of AccountingTypes and Forms of Business, Types of Accounting
Types and Forms of Business, Types of Accounting
 
Leadership
LeadershipLeadership
Leadership
 
Risk and Return, Time value of Money and Credit Rating Agencies
Risk and Return, Time value of Money and Credit Rating AgenciesRisk and Return, Time value of Money and Credit Rating Agencies
Risk and Return, Time value of Money and Credit Rating Agencies
 
Difference Between Culture and Civilization
Difference Between Culture and CivilizationDifference Between Culture and Civilization
Difference Between Culture and Civilization
 

Recently uploaded

SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 

Recently uploaded (20)

SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 

Computer security: hackers and Viruses

  • 3. 3 Computer Security • Definition – is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. • Computer Security measures – Data encryption – Passwords
  • 5. 5 What is computer virus? • Computer virus refers to a program which damages computer systems and/or destroys or erases data files • Virus is a small piece of program that can infect other programs by modifying them to include a copy of itself.
  • 6. 6 Types of Computer Virus • Time Bomb • Logical Bomb • Worm • Boot Sector Virus • Macros Virus • Script Virus • Trojan Virus
  • 7. 7 Time Bomb • Software that is inherently malicious, such as viruses and worms, often contain logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. • A time bomb is a virus program that performs an activity on a particular date
  • 8. 8 Logical Bomb • A logical bomb is a destructive program that performs an activity when a certain action has occurred. • Other way for the logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. • For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should they ever be terminated from the company.
  • 9. 9 Worm Virus • A worm is also a destructive program that fills a computer system with self-replicating information, clogging the system so that its operations are slowed down or stopped. • A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
  • 10. 10 Boot Sector Virus • A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk. • Boot-sector viruses infect computer systems by copying code either to the boot sector on a floppy disk or the partition table on a hard disk. During startup, the virus is loaded into memory. Once in memory, the virus will infect any non-infected disks accessed by the system.
  • 11. 11 Macros Virus • a macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications). • A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it, macro virus is loaded into main memory and destroys the data stored in hard disk.
  • 12. 12 Script Virus • Commonly found script viruses are written using the Visual Basic Scripting edition (VBS) and the JavaScript programming languages. • A Script Virus usually comes from webpage advertisements and is therefore wide-spread.
  • 13. 13 Trojan Virus • Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged. • Trojan Horse usually comes with monitoring tools and key loggers. • These actions can include: • Deleting data • Blocking data • Modifying data • Copying data
  • 15. 15 Definition • Hacking generally refers to unauthorized intrusion into a computer or a network. The person engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system. • Hacking can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.
  • 16. 16 Types of Hackers • White hat – breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. • Black hat – a black hat hacker who violates computer security for little reason beyond maliciousness or for personal gain . Black hat hackers break in to secure networks to destroy data or make the network unusable for those who are authorized to use the network.
  • 17. 17 Types of Hackers (Cont.) • Grey hat – A grey hat hackers is a combination of a black hat and a white hat hacker. A grey hacker may surf the internet and hack in to a computer system for the sole purpose of notifying the administrator that their system has a security defect – Ex: then they may offer to correct the defect for a fee • Script Kiddie – A script kiddie is some one who looks out to exploit vulnerability with not so much as trying to gain access to administrative or root access to the system
  • 18. 18 Types of Hackers (Cont.) • Crackers – Are the people aiming to create software tools that make it possible to attack computer systems or crack the copy protection of use-fee software. A crack is therefore an executable program created to modify the original software to as to remove its protection. • Carder’s Mainly attack chip card systems (particularly bank cards) to understand how they work and to exploit their flaws. The term carding refers to chip card piracy.
  • 19. 19 Why do Hackers Attack? • Financial Gain • Venting anger at a company or organization • Terrorism • Because they can!
  • 20. Top 5 Powerful Hacking Tools 20
  • 21. 21 Wire Shark • Network Mapping • Steal Cookies • Key Logging • Phishing • Men-in-the-Middel
  • 22. 22 AIRCRACK-NG • Wi-Fi Hacker/Cracker • Support All Version • Show pass.txt • Command Line User Interface
  • 23. 23 Meta Sploit • Forensic Tester • Trojan Creator • Support 6+ OS • Use With Steganography
  • 24. 24 Low Orbit Ion Cannon • DDOS Attacker • Recommend High Speed Internet • Network Jammer
  • 25. 25 Social Engineer Toolkit • Spear Phishing Attack Vector • Website Attack Vector • Infectious Media Generator • Create Payload and Lister • Mass Mailer Attack • Anduino Based Attack Vector • SMS Spoofing Attack Vector • Wireless Access Point Attack Vector • QR Code Generator Attack Vector • Power Shell Attack Vector • Third Party Module
  • 27. 27 Security Strategies Firewall – allows normal Web browser operations but prevents other types of communication – checks incoming data against a list of known sources – data rejected if it does not fit a preset profile
  • 28. 28 Security Strategies (Cont.) Network Sniffer – displays network traffic data – shows which resources employees use and Web sites they visit – can be used to troubleshoot network connections and improve system performance
  • 29. 29 Security Strategies (Cont.) Antivirus Software – detects and deletes known viruses – Internet allows antivirus software to update itself to detect newer viruses. – Some popular anti-virus programs: • Malware bytes • McAfee • Norton Utilities • F-Secure • Internet Guard Dog
  • 30. 30 Security Strategies (Cont.) Data Backups Organizations protect critical files by – keeping a copy of programs and data in a safe place – keep more than one backup of important databases and update them on a set schedule
  • 31. 31 Helpful Hints to Avoid Viruses • Obtain software only from trusted sources. • Use a safe Web browser and e-mail client. • Scan all newly-obtained disks, programs, and files.
  • 32. 32 Actions to prevent virus infection • Always update your anti-virus software at least weekly. • Back up your important files and ensure that they can be restored. • Change the computer's boot sequence to always start the PC from its hard drive • Don't share Drive C: without a password and without read-only restrictions. • Empty floppy drives of diskettes before turning on computers, especially laptops.
  • 33. 33 Actions to prevent virus infection • Forget opening unexpected e-mail attachments, even if they're from friends • Get trained on your computer's anti-virus software and use it. • Have multiple backups of important files. This lowers the chance that all are infected. • Install security updates for your operating system and programs as soon as possible. • Jump at the chance to learn more about your computer. This will help you spot viruses.
  • 35. 35 Conclusions • Computer Security is a continuous battle – As computer security gets tighter hackers are getting smarter