SlideShare a Scribd company logo
1 of 78
Computer Security
Internet Security
Physical Security
Computer Security
Computer Security
Computer Security
• It refers to protection of a computer and
the information stored in it, from the
unauthorised users.
Computer Security
• It refers to protection of a computer and the
information stored in it, from the
unauthorised users.
• Computer security is a branch of computer
technology known as information security as
applied to computers and networks.
Security Threats
Security Threats
1 Malicious Code and Software
2 Hackers and Crackers
Malicious Code and Software
Malicious Code and Software
• It is a software program that generates
threats to the computers and data stored
on it.
Malicious Code and Software
• It is a software program that generates
threats to the computers and data stored
on it.
• This code can be in the form of worms
,logic bombs, viruses, Trojan horses and
other type of software.
Malicious Code and Software
Hackers and Crackers
Hackers and Cracker
Hackers and Cracker
Hackers and Cracker
• A hacker is a person who breaks into
computers without authorisation. He is
actively involved in computer security and
are non professional or programmers
without formal training.
Malicious Program
Malicious Program
• Any computer program or code that is
designed to do harm, can be termed a
malicious program. Ex
– Virus , Worms , Trojan horse , Logic bomb
, Spyware etc.
Virus
Virus
• It is a computer program that can copy
itself and infect a computer without the
permission or knowledge of the owner. Virus
has the ability to infect different parts of
the computer.
Worms
Worms
Worms
• A computer worm is a self-replicating
computer designed to destroy data. Worm
program often use network connections to
spread from one computer to another
computer system. Thus, worms attack
systems that are linked through
communication lines.
Logic Bomb
Logic Bomb
Logic Bomb
• This is one of the oldest types of programs
and it embeds its code into legitimate
programs. Like a bomb it explodes all the
data when certain conditions are met. This
could be either destroying or deletion of
certain files on a particular time, and so on.
It reacts as a time bomb.
Trojan Horses
Trojan Horses
Trojan Horses
Trojan Horses
• Trojan appears to perform a desirable
function but in fact, performs undisclosed,
malicious function. These programs enter
into a computer through an e-mail or free
programs that are download from the
internet.
Trojan Horses
• Trojan appears to perform a desirable
function but in fact, performs undisclosed,
malicious function. These programs enter
into a computer through an e-mail or free
programs that are download from the
internet.
• Once they safely pass into the computer,
they may lie inactive from months before
they activated or complete control of the
computer is given to a hacker.
• It allows unauthorised access to the host
machine, giving them ability to save their
files on the user’s computer or even to
watch the user’s screen and to control
the computer.
Antivirus
Antivirus
• It is a software utility which mainly
prevents and removes computer viruses,
including worms and Trojan horses. It scan
the hard disk for viruses and tries to
removes them, if found.
Antivirus
Antivirus Protection
Security techniques from hacker
and crackers
Security techniques from hacker
and crackers
• Cryptography
• Captcha
Cryptography
Cryptography
• Cryptography is the process of alternating
the original massages to hide their meaning
from opponents who might intercept them.
Cryptography
• Cryptography is the process of alternating
the original massages to hide their meaning
from opponents who might intercept them.
• Cryptography relies upon to basic
components an algorithm and key.
• Some of the algorithm are given here.
1 Secret Key Cryptography
2 Public Key cryptography
3 Hash Function
4 Digital Signature
Secret Key Cryptography
Secret Key Cryptography
• A single key is used in SKC for both
encryption and decryption of data. In this
form of cryptography the key must be
known the sender and receiver.
Public Key Cryptography
Public Key Cryptography
• Each person in this techniques gets known
as the public and private key. Each person’s
public key is publicly known and private key
kept secret.
• The sender uses the receiver’s public key to
encrypt the message and when receiver
receives the encrypted massage , he uses
his private key to decrypt the massage.
Hash Function
Hash function
• It is also called massage digests and it is a
one way encryption algorithm that does not
use any key to encrypt or decrypt the
massage.
• It uses a digital fingerprint of a file’s
contents, in order to ensure that the file
has not been changed by an intruder or any
type of virus.
Digital Signature
Digital Signature
• Digital signature uses the public key
cryptography technique. It uses two
different keys in an algorithm but these are
mathematically related to each other. One
is for digital signature creation and another
key for verifying a digital signature.
Captcha
• It’s full name is “Completely Automated
Public Turing test to tell Computers and
Humans Apart”.
• In modern computers, a robot or an
automated program generates undesired
information in the web pages and websites.
• A Captcha is a type of test in computing to
make sure that the response is not
generated by a computer.
• A Captcha is a program that generates
Internet Security
Internet Security
• Internet Security is a branch of
information technology known
as information security as applied
to computers and networks.
OSI Reference Model
• Its full name is Open System
Interconnection.
• The International Standards Organization
developed in the early 1980 to promote
interoperability of network devices.
• It has seven layer.
Seven layer of OSI model
• Application Layer
• Presentation Layer
• Session Layer
• Transport Layer
• Network Layer
• Data Link Layer
• Physical Layer
Security for the OSI Model
Security for the OSI Model
• Authentication
• Access Control
• Logging and Monitoring
• Data Integrity
• Data Confidentiality
TCP/IP Reference Model
TCP/IP Reference Model
• TCP/IP is based a four layer reference
model.
• It is proposed by ISO(International Standards
Organization).
• Layers of TCP/IP model
Application Layer
Transport Layer
Internet Layer
Network Interface layer
Security for TCP/IP Model
Security for TCP/IP Model
• Routers :- A router is a network traffic
management device designed to forward
the packets. It consists of hardware and
software to implement the task for
forwarding the packets.
• Firewall :- Firewall is a system has been
designed to prevent the unauthorized
access to or from a private network.
Physical Security
Physical Security
• The connection between physical system
and logical systems ensure that, in order to
protect logical systems, the hardware which
is alive at that time must be physically
secured.
• It involves protecting sites from natural and
man-made physical threats.
Physical Security Threats
Physical Security Threats
• Weather : floods, fire, snow, ice, heat, cold
• Earth movement : earthquakes, mudslides
• Structural Failure : building collapse
• Fire/chemical : explosions, smoke
• Energy : loss of power, radiation, magnetic
wave infrastructure
• Biological : virus, infections of animal and
insects
Educating Personal
• An organization can educate its staff
members on the importance of their
physical security through the use of self-
paced or formal instructions, security
education bulletins , posters, training films
and tape or awareness data that drive home
the importance of constant vigilence.
Administrative Access Control
• This is an important category of physical
access control. It addresses the procedural
application of physical controls. There exist
different type of physical control devices
that make a site more secure.
Physical Security Controls
• This is the next category of the physical
access control which includes mechanical
and electronic access controls such as
gates, doors, keys and combination locks.
By physical security, most people
understand these types of access control
because these devices are the least
complicated and expensive.
Technical Controls
• The next category of physical security
control is the use of computer hardware and
software. Some of the technical security
measures are discussed here. A smart card,
which is similar to regular payment card,
access card, the smart card has many
purpose, such as medical identification,
travel ticketing identifiction and builiding
access control.
The End
(Follow me for more updates)

More Related Content

What's hot

Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
Srinu Potnuru
 
Information security threats
Information security threatsInformation security threats
Information security threats
complianceonline123
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
swapneel07
 

What's hot (20)

Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Computer security
Computer securityComputer security
Computer security
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Computer security
Computer securityComputer security
Computer security
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Computer security
Computer securityComputer security
Computer security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 

Viewers also liked

Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
Wajahat Rajab
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
introduction to personnel security
introduction to personnel securityintroduction to personnel security
introduction to personnel security
IVAN MOSES OKUNI
 
Tech law conference presentation final
Tech law conference presentation finalTech law conference presentation final
Tech law conference presentation final
nzde
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
satyakam_biswas
 
C:\fakepath\security training
C:\fakepath\security trainingC:\fakepath\security training
C:\fakepath\security training
mikeapitre
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
Desmond Devendran
 

Viewers also liked (20)

Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
The ALISS project
The ALISS projectThe ALISS project
The ALISS project
 
Personal Security Expo
Personal Security ExpoPersonal Security Expo
Personal Security Expo
 
Personnel security
Personnel securityPersonnel security
Personnel security
 
PERSONAL SECURITY
PERSONAL SECURITYPERSONAL SECURITY
PERSONAL SECURITY
 
introduction to personnel security
introduction to personnel securityintroduction to personnel security
introduction to personnel security
 
Tech law conference presentation final
Tech law conference presentation finalTech law conference presentation final
Tech law conference presentation final
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 
C:\fakepath\security training
C:\fakepath\security trainingC:\fakepath\security training
C:\fakepath\security training
 
Personal Security In High Risk Areas
Personal Security In High Risk AreasPersonal Security In High Risk Areas
Personal Security In High Risk Areas
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 Framework
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 
COBIT5 Implementation Guidance
COBIT5 Implementation GuidanceCOBIT5 Implementation Guidance
COBIT5 Implementation Guidance
 
Hardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk ManagementHardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk Management
 

Similar to Computer , Internet and physical security.

Similar to Computer , Internet and physical security. (20)

Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Computer security
Computer securityComputer security
Computer security
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Session Slide
Session SlideSession Slide
Session Slide
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Communication security
Communication securityCommunication security
Communication security
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Dos unit 5
Dos unit 5Dos unit 5
Dos unit 5
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Computer Security update and virus .pptx
Computer Security  update and virus .pptxComputer Security  update and virus .pptx
Computer Security update and virus .pptx
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 

More from Ankur Kumar

Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of Computers
Ankur Kumar
 

More from Ankur Kumar (16)

Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
Be Creative
Be CreativeBe Creative
Be Creative
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Trade Mark
Trade MarkTrade Mark
Trade Mark
 
E commerce
E commerceE commerce
E commerce
 
Gsm network
Gsm networkGsm network
Gsm network
 
Digital modulation
Digital modulationDigital modulation
Digital modulation
 
Quadric surfaces
Quadric surfacesQuadric surfaces
Quadric surfaces
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of Computers
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Termes - Termite inspired robots that can build for us.
Termes - Termite inspired robots that can build for us.Termes - Termite inspired robots that can build for us.
Termes - Termite inspired robots that can build for us.
 
Illumination model
Illumination modelIllumination model
Illumination model
 
Hidden lines & surfaces
Hidden lines & surfacesHidden lines & surfaces
Hidden lines & surfaces
 
Tracking positioning-of-mobiles
Tracking positioning-of-mobilesTracking positioning-of-mobiles
Tracking positioning-of-mobiles
 
Tracking and positioning_of_mobile_systems_in_telecom_network
Tracking and positioning_of_mobile_systems_in_telecom_networkTracking and positioning_of_mobile_systems_in_telecom_network
Tracking and positioning_of_mobile_systems_in_telecom_network
 

Recently uploaded

valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 

Recently uploaded (20)

Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 

Computer , Internet and physical security.

  • 4. Computer Security • It refers to protection of a computer and the information stored in it, from the unauthorised users.
  • 5. Computer Security • It refers to protection of a computer and the information stored in it, from the unauthorised users. • Computer security is a branch of computer technology known as information security as applied to computers and networks.
  • 7. Security Threats 1 Malicious Code and Software 2 Hackers and Crackers
  • 9. Malicious Code and Software • It is a software program that generates threats to the computers and data stored on it.
  • 10. Malicious Code and Software • It is a software program that generates threats to the computers and data stored on it. • This code can be in the form of worms ,logic bombs, viruses, Trojan horses and other type of software.
  • 11. Malicious Code and Software
  • 15. Hackers and Cracker • A hacker is a person who breaks into computers without authorisation. He is actively involved in computer security and are non professional or programmers without formal training.
  • 16.
  • 17.
  • 19. Malicious Program • Any computer program or code that is designed to do harm, can be termed a malicious program. Ex – Virus , Worms , Trojan horse , Logic bomb , Spyware etc.
  • 20. Virus
  • 21. Virus • It is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. Virus has the ability to infect different parts of the computer.
  • 22.
  • 23. Worms
  • 24. Worms
  • 25. Worms • A computer worm is a self-replicating computer designed to destroy data. Worm program often use network connections to spread from one computer to another computer system. Thus, worms attack systems that are linked through communication lines.
  • 26.
  • 29. Logic Bomb • This is one of the oldest types of programs and it embeds its code into legitimate programs. Like a bomb it explodes all the data when certain conditions are met. This could be either destroying or deletion of certain files on a particular time, and so on. It reacts as a time bomb.
  • 30.
  • 34. Trojan Horses • Trojan appears to perform a desirable function but in fact, performs undisclosed, malicious function. These programs enter into a computer through an e-mail or free programs that are download from the internet.
  • 35. Trojan Horses • Trojan appears to perform a desirable function but in fact, performs undisclosed, malicious function. These programs enter into a computer through an e-mail or free programs that are download from the internet. • Once they safely pass into the computer, they may lie inactive from months before they activated or complete control of the computer is given to a hacker.
  • 36. • It allows unauthorised access to the host machine, giving them ability to save their files on the user’s computer or even to watch the user’s screen and to control the computer.
  • 37.
  • 39. Antivirus • It is a software utility which mainly prevents and removes computer viruses, including worms and Trojan horses. It scan the hard disk for viruses and tries to removes them, if found.
  • 42. Security techniques from hacker and crackers
  • 43. Security techniques from hacker and crackers • Cryptography • Captcha
  • 45. Cryptography • Cryptography is the process of alternating the original massages to hide their meaning from opponents who might intercept them.
  • 46. Cryptography • Cryptography is the process of alternating the original massages to hide their meaning from opponents who might intercept them. • Cryptography relies upon to basic components an algorithm and key. • Some of the algorithm are given here. 1 Secret Key Cryptography 2 Public Key cryptography 3 Hash Function 4 Digital Signature
  • 48. Secret Key Cryptography • A single key is used in SKC for both encryption and decryption of data. In this form of cryptography the key must be known the sender and receiver.
  • 50. Public Key Cryptography • Each person in this techniques gets known as the public and private key. Each person’s public key is publicly known and private key kept secret. • The sender uses the receiver’s public key to encrypt the message and when receiver receives the encrypted massage , he uses his private key to decrypt the massage.
  • 51.
  • 53. Hash function • It is also called massage digests and it is a one way encryption algorithm that does not use any key to encrypt or decrypt the massage. • It uses a digital fingerprint of a file’s contents, in order to ensure that the file has not been changed by an intruder or any type of virus.
  • 55. Digital Signature • Digital signature uses the public key cryptography technique. It uses two different keys in an algorithm but these are mathematically related to each other. One is for digital signature creation and another key for verifying a digital signature.
  • 56.
  • 57.
  • 58. Captcha • It’s full name is “Completely Automated Public Turing test to tell Computers and Humans Apart”. • In modern computers, a robot or an automated program generates undesired information in the web pages and websites. • A Captcha is a type of test in computing to make sure that the response is not generated by a computer. • A Captcha is a program that generates
  • 59.
  • 61. Internet Security • Internet Security is a branch of information technology known as information security as applied to computers and networks.
  • 62. OSI Reference Model • Its full name is Open System Interconnection. • The International Standards Organization developed in the early 1980 to promote interoperability of network devices. • It has seven layer.
  • 63. Seven layer of OSI model • Application Layer • Presentation Layer • Session Layer • Transport Layer • Network Layer • Data Link Layer • Physical Layer
  • 64. Security for the OSI Model
  • 65. Security for the OSI Model • Authentication • Access Control • Logging and Monitoring • Data Integrity • Data Confidentiality
  • 67. TCP/IP Reference Model • TCP/IP is based a four layer reference model. • It is proposed by ISO(International Standards Organization). • Layers of TCP/IP model Application Layer Transport Layer Internet Layer Network Interface layer
  • 69. Security for TCP/IP Model • Routers :- A router is a network traffic management device designed to forward the packets. It consists of hardware and software to implement the task for forwarding the packets. • Firewall :- Firewall is a system has been designed to prevent the unauthorized access to or from a private network.
  • 71. Physical Security • The connection between physical system and logical systems ensure that, in order to protect logical systems, the hardware which is alive at that time must be physically secured. • It involves protecting sites from natural and man-made physical threats.
  • 73. Physical Security Threats • Weather : floods, fire, snow, ice, heat, cold • Earth movement : earthquakes, mudslides • Structural Failure : building collapse • Fire/chemical : explosions, smoke • Energy : loss of power, radiation, magnetic wave infrastructure • Biological : virus, infections of animal and insects
  • 74. Educating Personal • An organization can educate its staff members on the importance of their physical security through the use of self- paced or formal instructions, security education bulletins , posters, training films and tape or awareness data that drive home the importance of constant vigilence.
  • 75. Administrative Access Control • This is an important category of physical access control. It addresses the procedural application of physical controls. There exist different type of physical control devices that make a site more secure.
  • 76. Physical Security Controls • This is the next category of the physical access control which includes mechanical and electronic access controls such as gates, doors, keys and combination locks. By physical security, most people understand these types of access control because these devices are the least complicated and expensive.
  • 77. Technical Controls • The next category of physical security control is the use of computer hardware and software. Some of the technical security measures are discussed here. A smart card, which is similar to regular payment card, access card, the smart card has many purpose, such as medical identification, travel ticketing identifiction and builiding access control.
  • 78. The End (Follow me for more updates)