SlideShare a Scribd company logo
1 of 28
Computer Security
Computer Security 
 Through your PC, a malicious person can 
gain valuable information 
– About you and your habits 
– Can steal your files 
– Run programs that log your keystrokes and thus 
gain account names and passwords, credit card 
information 
– Run software that takes over much of your 
computer processing time and use it to send 
spam or steal from others
Analyzing the Threat 
 Threats to your data and PC come from two 
directions: 
– Mistakes 
– Malicious people 
 Issues: 
– Unauthorized access 
– Data destruction, accidental or deliberate 
– Administrative access 
– Catastrophic hardware failures 
– Viruses/spyware
Local Control 
 Need to establish control over local resources 
– Back up data and make sure that retired hard drives and 
optical discs have no sensitive data on them 
– You should recognize security issues and be able to 
respond properly 
– You need to implement good access control policies, such 
as having 
 All computers in your care locked down with proper 
passwords or other devices that recognize who should have 
access 
 Implement methods for tracking computer usage. 
– If someone is doing something wrong, you and the 
network or computer administrator should be able to catch 
him or her! 
 Backup Essential Data
Social Engineering 
 The process of using or manipulating 
people inside the networking 
environment to gain access to that 
network from the outside 
 The term “social engineering” covers 
the many ways humans can use other 
humans to gain unauthorized 
information
Infiltration 
 Hackers can physically enter your 
building under the guise of someone 
who might have a legitimate reason 
for being there, 
– Cleaning personnel, repair technicians, or 
messengers
Telephone Scams 
 Telephone scams are probably the 
most common social engineering 
attack 
 The attacker makes a phone call to 
someone in the organization to gain 
information
Dumpster Diving 
 Generic term for anytime a hacker 
goes through your refuse (rubbish), 
looking for information
Physical Theft 
 Someone physically steal the server
Access Control 
 Control access to the data, programs, 
and other computing resources
Secure Physical Area and 
Lock Down Your System 
 Block access to the physical hardware 
from people who shouldn’t have 
access
Authentication 
 Means How the computer determines 
– Who can or should access it 
– Once accessed, what that user can do 
 A computer can authenticate users 
through 
– Software or hardware 
– Combination of both
NTFS, Not FAT32 
 Must use NTFS or you have no 
security at all 
 Use the CONVERT command-line utility 
to go from FAT to NTFS 
– CONVERT D: /FS:NTFS
Network Security 
 User Account Control Through Groups 
 Security Policies 
Commonly used: 
– Prevent Registry Edits 
 If you try to edit the Registry, you get a failure message 
– Prevent Access to the Command Prompt 
 This policy keeps users from getting to the command prompt by turning off the Run 
command and the MS-DOS Prompt shortcut 
– Log on Locally 
 This policy defines who may log on to the system locally 
– Shut Down System 
 This policy defines who may shut down the system 
– Minimum Password Length 
 This policy forces a minimum password length 
– Account Lockout Threshold 
 This policy sets the maximum number of logon attempts a person can make before they are 
locked out of the account 
– Disable Windows Installer 
 This policy prevents users from installing software 
– Printer Browsing 
 This policy enables users to browse for printers on the network, as opposed to using only 
assigned printers
Viruses 
 A computer virus is a piece of malicious software 
that gets passed from computer to computer 
 A computer virus is designed to attach itself to a 
program on your computer 
– It could be your e-mail program, your word processor, or 
even a game 
– Whenever you use the infected program, the virus goes 
into action and does whatever it was designed to do 
– It can wipe out your e-mail or even erase your entire hard 
drive! Viruses are also sometimes used to steal 
information or send spam e-mails to everyone in your 
address book
Virus 
 Trojans 
 Worms 
 Polymorphics/Polymorphs 
 Stealth
Antivirus Programs 
 Protects your PC in two (2) ways 
 It can be both sword and shield 
– Working in an active seek-and-destroy 
mode 
– A passive sentry mode
Spam 
 E-mail that comes into your Inbox 
from a source that’s not a friend, 
family member, or colleague, and that 
you didn’t ask for 
 Pop-ups 
 Spyware 
 Adware
Firewalls 
 Devices or software that protect an internal 
network from unauthorized access to and 
from the Internet at large 
 Hardware firewalls protect networks using a 
number of methods, such as hiding IP 
addresses and blocking TCP/IP ports 
 Windows XP comes with an excellent 
software firewall 
– Windows Firewall
Encryption 
 Stop someone to intercept and inspect 
the packet 
 Inspected packets are a cornucopia of 
– Passwords 
– Account names 
– Other tidbits that hackers can use to 
intrude into your network
Network Authentication 
 PAP Password Authentication Protocol (PAP) 
– Is the oldest and most basic form of 
authentication 
– It’s also the least safe, because it sends all 
passwords in clear text 
– No NOS uses PAP for a client system’s login, but 
almost all network operating systems that 
provide remote access service will support PAP 
for backward compatibility with a host of older 
programs (like Telnet) that only use PAP
Network Authentication 
 CHAP Challenge Handshake Authentication 
Protocol (CHAP) is the most common 
remote access protocol 
 CHAP has the serving system challenge the 
remote client 
– A challenge is where the host system asks the 
remote client some secret—usually a password 
that the remote client must then respond with 
for the host to allow the connection
Network Authentication 
 MS-CHAP MS-CHAP is Microsoft’s 
variation of the CHAP protocol. It uses 
a slightly more advanced encryption 
protocol
Data Encryption 
 Encryption methods don’t stop at the 
authentication level 
 There are a number of ways to encrypt 
network data as well 
 IPSec (IP Security) 
– Provides transparent encryption between the 
server and the client 
– Also work in VPNs, but other encryption methods 
are more commonly used in those situations
Application Encryption 
 Famous of all application encryptions 
is Netscape’s Secure Sockets Layer 
(SSL) 
– Protocols make it possible to create the 
secure Web sites used to make purchases 
over the Internet 
– HTTPS Web sites can be identified by the 
HTTPS:// included in their URL
Wireless Issues 
 Set up wireless encryption, at least WEP but preferably WPA or the more 
secure WPA2, and configure clients to use them 
 Disable DHCP and require your wireless clients to use a static IP address 
 If you need to use DHCP, only allot enough DHCP addresses to meet the 
needs of your network to avoid unused wireless connections 
 Change the WAP’s SSID from default and disable SSID broadcast 
 Filter by MAC address to allow only known clients on the network 
 Change the default user name and password. Every hacker has memorized 
the default user names and passwords 
 Update the firmware as needed 
 If available, make sure the WAP’s firewall settings are turned on
Reporting 
 Event Viewer 
 Auditing
Incidence Reporting 
 First 
– It provides a record of work you’ve done 
and accomplished 
 Second 
– It provides a piece of information that 
when combined with other information 
that you might or might not know, 
reveals a pattern or bigger problem to 
someone higher up the chain

More Related Content

What's hot

Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filtersMOHIT AGARWAL
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationGopal Sakarkar
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 

What's hot (18)

Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Firewalls-Intro
Firewalls-IntroFirewalls-Intro
Firewalls-Intro
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 

Viewers also liked

24 the complete pc tech
24 the complete pc tech24 the complete pc tech
24 the complete pc techhafizhanif86
 
Climate Change: Implications for Agriculture
Climate Change: Implications for Agriculture Climate Change: Implications for Agriculture
Climate Change: Implications for Agriculture ECFoundation
 
Sbpagajiguru 111209023917-phpapp02
Sbpagajiguru 111209023917-phpapp02Sbpagajiguru 111209023917-phpapp02
Sbpagajiguru 111209023917-phpapp02iyatieku ayune
 
Gerenciando seu empreendimento e7
Gerenciando seu empreendimento   e7Gerenciando seu empreendimento   e7
Gerenciando seu empreendimento e7silviofsouza
 
Thesis Paul van Nierop: Muziekwolk
Thesis Paul van Nierop: MuziekwolkThesis Paul van Nierop: Muziekwolk
Thesis Paul van Nierop: Muziekwolkpavanie
 
Manual salud ocupacional_contratistas (1)
Manual salud ocupacional_contratistas (1)Manual salud ocupacional_contratistas (1)
Manual salud ocupacional_contratistas (1)Liz Vargas
 
Teaching with Sakai CLE from the Ground Up!
Teaching with Sakai CLE from the Ground Up!Teaching with Sakai CLE from the Ground Up!
Teaching with Sakai CLE from the Ground Up!LandonPhillips
 
Kuliah Ii New2
Kuliah Ii New2Kuliah Ii New2
Kuliah Ii New2ramboni
 
1 comptia certification
1 comptia certification1 comptia certification
1 comptia certificationhafizhanif86
 
12 installing and upgrading windows
12 installing and upgrading windows12 installing and upgrading windows
12 installing and upgrading windowshafizhanif86
 

Viewers also liked (20)

22 the internet
22 the internet22 the internet
22 the internet
 
24 the complete pc tech
24 the complete pc tech24 the complete pc tech
24 the complete pc tech
 
Climate Change: Implications for Agriculture
Climate Change: Implications for Agriculture Climate Change: Implications for Agriculture
Climate Change: Implications for Agriculture
 
Sbpagajiguru 111209023917-phpapp02
Sbpagajiguru 111209023917-phpapp02Sbpagajiguru 111209023917-phpapp02
Sbpagajiguru 111209023917-phpapp02
 
Word.01
Word.01Word.01
Word.01
 
Chinese 014
Chinese 014Chinese 014
Chinese 014
 
17 video
17 video17 video
17 video
 
8 power supplies
8 power supplies8 power supplies
8 power supplies
 
gizi terapan
gizi terapangizi terapan
gizi terapan
 
2 the visible pc
2 the visible pc2 the visible pc
2 the visible pc
 
18 sound
18 sound18 sound
18 sound
 
Gerenciando seu empreendimento e7
Gerenciando seu empreendimento   e7Gerenciando seu empreendimento   e7
Gerenciando seu empreendimento e7
 
Thesis Paul van Nierop: Muziekwolk
Thesis Paul van Nierop: MuziekwolkThesis Paul van Nierop: Muziekwolk
Thesis Paul van Nierop: Muziekwolk
 
Manual salud ocupacional_contratistas (1)
Manual salud ocupacional_contratistas (1)Manual salud ocupacional_contratistas (1)
Manual salud ocupacional_contratistas (1)
 
Teaching with Sakai CLE from the Ground Up!
Teaching with Sakai CLE from the Ground Up!Teaching with Sakai CLE from the Ground Up!
Teaching with Sakai CLE from the Ground Up!
 
4 ram
4 ram4 ram
4 ram
 
Kuliah Ii New2
Kuliah Ii New2Kuliah Ii New2
Kuliah Ii New2
 
1 comptia certification
1 comptia certification1 comptia certification
1 comptia certification
 
7 motherboards
7 motherboards7 motherboards
7 motherboards
 
12 installing and upgrading windows
12 installing and upgrading windows12 installing and upgrading windows
12 installing and upgrading windows
 

Similar to 23 computer security

Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingANURAG CHAKRABORTY
 
Complete notes security
Complete notes securityComplete notes security
Complete notes securityKitkat Emoo
 
Security Architectures and Models.pptx
Security Architectures and Models.pptxSecurity Architectures and Models.pptx
Security Architectures and Models.pptxRushikeshChikane2
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
It security
It securityIt security
It securityavi2607
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking securityRaja Waseem Akhtar
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Securitydrkelleher
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Miigaa Mine
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure InfrastructuresPROIDEA
 
Module 5 security
Module 5   securityModule 5   security
Module 5 securityIT
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdfZeeshanMajeed15
 
Operating systems and computer security
Operating systems and computer securityOperating systems and computer security
Operating systems and computer securitySwati Bhonde
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 

Similar to 23 computer security (20)

Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
 
Security Architectures and Models.pptx
Security Architectures and Models.pptxSecurity Architectures and Models.pptx
Security Architectures and Models.pptx
 
Windows network security
Windows network securityWindows network security
Windows network security
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Network security
Network securityNetwork security
Network security
 
It security
It securityIt security
It security
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
Windows network
Windows networkWindows network
Windows network
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
 
Operating systems and computer security
Operating systems and computer securityOperating systems and computer security
Operating systems and computer security
 
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian RechbergerAndrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
 
Computing safety
Computing safetyComputing safety
Computing safety
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 

More from hafizhanif86

21 local area connection
21 local area connection21 local area connection
21 local area connectionhafizhanif86
 
19 portable computing
19 portable computing19 portable computing
19 portable computinghafizhanif86
 
16 supporting io devices
16 supporting io devices16 supporting io devices
16 supporting io deviceshafizhanif86
 
15 maintaining & troubleshooting windows
15 maintaining & troubleshooting windows15 maintaining & troubleshooting windows
15 maintaining & troubleshooting windowshafizhanif86
 
14 working with the command line interface
14 working with the command line interface14 working with the command line interface
14 working with the command line interfacehafizhanif86
 
13 understanding windows
13 understanding windows13 understanding windows
13 understanding windowshafizhanif86
 
11 removable media
11 removable media11 removable media
11 removable mediahafizhanif86
 
10 implementing hard drive
10 implementing hard drive10 implementing hard drive
10 implementing hard drivehafizhanif86
 
9 hard drive technologies
9 hard drive technologies9 hard drive technologies
9 hard drive technologieshafizhanif86
 
5 post , bios , cmos
5 post , bios , cmos5 post , bios , cmos
5 post , bios , cmoshafizhanif86
 

More from hafizhanif86 (13)

21 local area connection
21 local area connection21 local area connection
21 local area connection
 
20 printers
20 printers20 printers
20 printers
 
19 portable computing
19 portable computing19 portable computing
19 portable computing
 
16 supporting io devices
16 supporting io devices16 supporting io devices
16 supporting io devices
 
15 maintaining & troubleshooting windows
15 maintaining & troubleshooting windows15 maintaining & troubleshooting windows
15 maintaining & troubleshooting windows
 
14 working with the command line interface
14 working with the command line interface14 working with the command line interface
14 working with the command line interface
 
13 understanding windows
13 understanding windows13 understanding windows
13 understanding windows
 
11 removable media
11 removable media11 removable media
11 removable media
 
10 implementing hard drive
10 implementing hard drive10 implementing hard drive
10 implementing hard drive
 
9 hard drive technologies
9 hard drive technologies9 hard drive technologies
9 hard drive technologies
 
6 expansion bus
6 expansion bus6 expansion bus
6 expansion bus
 
5 post , bios , cmos
5 post , bios , cmos5 post , bios , cmos
5 post , bios , cmos
 
3 microprocessors
3 microprocessors3 microprocessors
3 microprocessors
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

23 computer security

  • 2. Computer Security  Through your PC, a malicious person can gain valuable information – About you and your habits – Can steal your files – Run programs that log your keystrokes and thus gain account names and passwords, credit card information – Run software that takes over much of your computer processing time and use it to send spam or steal from others
  • 3. Analyzing the Threat  Threats to your data and PC come from two directions: – Mistakes – Malicious people  Issues: – Unauthorized access – Data destruction, accidental or deliberate – Administrative access – Catastrophic hardware failures – Viruses/spyware
  • 4. Local Control  Need to establish control over local resources – Back up data and make sure that retired hard drives and optical discs have no sensitive data on them – You should recognize security issues and be able to respond properly – You need to implement good access control policies, such as having  All computers in your care locked down with proper passwords or other devices that recognize who should have access  Implement methods for tracking computer usage. – If someone is doing something wrong, you and the network or computer administrator should be able to catch him or her!  Backup Essential Data
  • 5. Social Engineering  The process of using or manipulating people inside the networking environment to gain access to that network from the outside  The term “social engineering” covers the many ways humans can use other humans to gain unauthorized information
  • 6. Infiltration  Hackers can physically enter your building under the guise of someone who might have a legitimate reason for being there, – Cleaning personnel, repair technicians, or messengers
  • 7. Telephone Scams  Telephone scams are probably the most common social engineering attack  The attacker makes a phone call to someone in the organization to gain information
  • 8. Dumpster Diving  Generic term for anytime a hacker goes through your refuse (rubbish), looking for information
  • 9. Physical Theft  Someone physically steal the server
  • 10. Access Control  Control access to the data, programs, and other computing resources
  • 11. Secure Physical Area and Lock Down Your System  Block access to the physical hardware from people who shouldn’t have access
  • 12. Authentication  Means How the computer determines – Who can or should access it – Once accessed, what that user can do  A computer can authenticate users through – Software or hardware – Combination of both
  • 13. NTFS, Not FAT32  Must use NTFS or you have no security at all  Use the CONVERT command-line utility to go from FAT to NTFS – CONVERT D: /FS:NTFS
  • 14. Network Security  User Account Control Through Groups  Security Policies Commonly used: – Prevent Registry Edits  If you try to edit the Registry, you get a failure message – Prevent Access to the Command Prompt  This policy keeps users from getting to the command prompt by turning off the Run command and the MS-DOS Prompt shortcut – Log on Locally  This policy defines who may log on to the system locally – Shut Down System  This policy defines who may shut down the system – Minimum Password Length  This policy forces a minimum password length – Account Lockout Threshold  This policy sets the maximum number of logon attempts a person can make before they are locked out of the account – Disable Windows Installer  This policy prevents users from installing software – Printer Browsing  This policy enables users to browse for printers on the network, as opposed to using only assigned printers
  • 15. Viruses  A computer virus is a piece of malicious software that gets passed from computer to computer  A computer virus is designed to attach itself to a program on your computer – It could be your e-mail program, your word processor, or even a game – Whenever you use the infected program, the virus goes into action and does whatever it was designed to do – It can wipe out your e-mail or even erase your entire hard drive! Viruses are also sometimes used to steal information or send spam e-mails to everyone in your address book
  • 16. Virus  Trojans  Worms  Polymorphics/Polymorphs  Stealth
  • 17. Antivirus Programs  Protects your PC in two (2) ways  It can be both sword and shield – Working in an active seek-and-destroy mode – A passive sentry mode
  • 18. Spam  E-mail that comes into your Inbox from a source that’s not a friend, family member, or colleague, and that you didn’t ask for  Pop-ups  Spyware  Adware
  • 19. Firewalls  Devices or software that protect an internal network from unauthorized access to and from the Internet at large  Hardware firewalls protect networks using a number of methods, such as hiding IP addresses and blocking TCP/IP ports  Windows XP comes with an excellent software firewall – Windows Firewall
  • 20. Encryption  Stop someone to intercept and inspect the packet  Inspected packets are a cornucopia of – Passwords – Account names – Other tidbits that hackers can use to intrude into your network
  • 21. Network Authentication  PAP Password Authentication Protocol (PAP) – Is the oldest and most basic form of authentication – It’s also the least safe, because it sends all passwords in clear text – No NOS uses PAP for a client system’s login, but almost all network operating systems that provide remote access service will support PAP for backward compatibility with a host of older programs (like Telnet) that only use PAP
  • 22. Network Authentication  CHAP Challenge Handshake Authentication Protocol (CHAP) is the most common remote access protocol  CHAP has the serving system challenge the remote client – A challenge is where the host system asks the remote client some secret—usually a password that the remote client must then respond with for the host to allow the connection
  • 23. Network Authentication  MS-CHAP MS-CHAP is Microsoft’s variation of the CHAP protocol. It uses a slightly more advanced encryption protocol
  • 24. Data Encryption  Encryption methods don’t stop at the authentication level  There are a number of ways to encrypt network data as well  IPSec (IP Security) – Provides transparent encryption between the server and the client – Also work in VPNs, but other encryption methods are more commonly used in those situations
  • 25. Application Encryption  Famous of all application encryptions is Netscape’s Secure Sockets Layer (SSL) – Protocols make it possible to create the secure Web sites used to make purchases over the Internet – HTTPS Web sites can be identified by the HTTPS:// included in their URL
  • 26. Wireless Issues  Set up wireless encryption, at least WEP but preferably WPA or the more secure WPA2, and configure clients to use them  Disable DHCP and require your wireless clients to use a static IP address  If you need to use DHCP, only allot enough DHCP addresses to meet the needs of your network to avoid unused wireless connections  Change the WAP’s SSID from default and disable SSID broadcast  Filter by MAC address to allow only known clients on the network  Change the default user name and password. Every hacker has memorized the default user names and passwords  Update the firmware as needed  If available, make sure the WAP’s firewall settings are turned on
  • 27. Reporting  Event Viewer  Auditing
  • 28. Incidence Reporting  First – It provides a record of work you’ve done and accomplished  Second – It provides a piece of information that when combined with other information that you might or might not know, reveals a pattern or bigger problem to someone higher up the chain