Heriot-Watt University <br />Tutor: Josie Pilcher <br />Date: 07/06/2006<br />Home Computer Security <br />By: Mohammed A....
Home Computer Security <br />Heriot-Watt University <br /><ul><li>  Home Computer Data is at Risk
  Computer Security Risk Management
  Home Computer Network and the Internet
Network Connection Requirements
Computer Ports and Address
  Common Security Threats against Home Computer
  Protecting Home Computer
the Main steps to Protect Home Computer Data
 Conclusions </li></li></ul><li>Home Computer Security <br />Heriot-Watt University <br />Home Computer Data is at Risk<br...
Home Computer Security <br />Heriot-Watt University <br />Home Computer Data is at Risk<br /><ul><li> There are many users...
There are a growing number of sources that can put home computer data at risk (Nash, 2004).
WindowsXP is the most popular operating system for home computers according to W3 School Web Site although “Windows XP, th...
Home Computer Security <br />Heriot-Watt University <br />Home Computer Data is at Risk<br />Malicious Code (2004/2005)-Li...
Home Computer Security <br />Confidentiality<br />Heriot-Watt University <br />Integrity<br />Availability<br />Computer S...
Home Computer Security <br />Heriot-Watt University <br />Computer Security Risk Management<br /><ul><li>According to Ruth...
Home Computer Security <br />Heriot-Watt University <br />Home Computer Network and the Internet<br /><ul><li>Basically, a...
Upcoming SlideShare
Loading in …5
×

Home Computer Security Presentation 1 Of 2

1,906 views

Published on

I hope you will find this brief presentation an enjoyable and useful

  • Be the first to comment

  • Be the first to like this

Home Computer Security Presentation 1 Of 2

  1. 1. Heriot-Watt University <br />Tutor: Josie Pilcher <br />Date: 07/06/2006<br />Home Computer Security <br />By: Mohammed A. Wahig Al-Sahli<br />
  2. 2. Home Computer Security <br />Heriot-Watt University <br /><ul><li> Home Computer Data is at Risk
  3. 3. Computer Security Risk Management
  4. 4. Home Computer Network and the Internet
  5. 5. Network Connection Requirements
  6. 6. Computer Ports and Address
  7. 7. Common Security Threats against Home Computer
  8. 8. Protecting Home Computer
  9. 9. the Main steps to Protect Home Computer Data
  10. 10. Conclusions </li></li></ul><li>Home Computer Security <br />Heriot-Watt University <br />Home Computer Data is at Risk<br />The Risk is the exposure to loss or possible injury with information security (Ruth and Mudson 2003) . <br />A Threat to information security is any activity that represents possible danger to the user information(Ruth and Mudson 2003) .<br />A Vulnerability is a weakness in user information security that could be exploited by a threat or it is a weakness in user’ operating systems (Ruth and Mudson 2003) .<br />
  11. 11. Home Computer Security <br />Heriot-Watt University <br />Home Computer Data is at Risk<br /><ul><li> There are many users who do not realize that they need to pay attention to their computer security (Rogers, 2002).
  12. 12. There are a growing number of sources that can put home computer data at risk (Nash, 2004).
  13. 13. WindowsXP is the most popular operating system for home computers according to W3 School Web Site although “Windows XP, the most insecure computer operating system ever invented” (Walker, 2005, P1).</li></li></ul><li>Home Computer Security <br />Heriot-Watt University <br />Home Computer Data is at Risk<br />
  14. 14. Home Computer Security <br />Heriot-Watt University <br />Home Computer Data is at Risk<br />Malicious Code (2004/2005)-LinuxBy Kaspersky Web Site<br />
  15. 15. Home Computer Security <br />Confidentiality<br />Heriot-Watt University <br />Integrity<br />Availability<br />Computer Security Risk Management<br /><ul><li>There are three aims of computer security; they are Confidentiality, Integrity, and Availability which must be protected. (Ruth, and Mudson, 2003).</li></ul>This term is referred to as C-I-A triad<br />
  16. 16. Home Computer Security <br />Heriot-Watt University <br />Computer Security Risk Management<br /><ul><li>According to Ruth and Mudson (2003) “computer users could minimize risk by identifying vulnerabilities, threats, and the potential risks and creating mitigation plan for those risks. Mitigation is defined as making something less harmful or less painful”.</li></ul>the Computer Security Risk Management<br />
  17. 17. Home Computer Security <br />Heriot-Watt University <br />Home Computer Network and the Internet<br /><ul><li>Basically, a network is two computers or more connect together for communications, sharing some data, or sharing some sources such as printers, scanners, or Internet connection(Ruth, & Mudson, 2003).
  18. 18. According to Roark and Devine (2002)networks can be categorized</li></ul> to:<br />Server-based networks<br />Enterprise networks<br />Peer-to-Peer networks <br />which is used commonly for home computers.<br />
  19. 19. Home Computer Security <br />Heriot-Watt University <br />Home Computer Network and the Internet<br /><ul><li> Network Connection Requirements</li></ul> Client Operating Systems such as MS Windows XP. <br /> Server Operating Systems such as MS Windows Server 2003. <br /> A Network Interface Card (a NIC).<br /> Networking Protocols which means a set of rules that controls a network exchanging data between the nodes (Roark and Devine, 2002).<br /> The connection device such as Hub, Switch, or Router.<br />
  20. 20. Home Computer Security <br />Heriot-Watt University <br />Home Computer Network and the Internet<br /><ul><li> Computer Ports and Address
  21. 21. Each device connected to the network has a unique</li></ul> address called an IP address. (for example: 192.127.12.108 )<br /><ul><li>each program on the computer can send or receive data</li></ul> over the Internet deals with a specific Port. <br />
  22. 22. Home Computer Security <br />Heriot-Watt University <br />Common Security Threats against Home Computer<br />There is a variety of malicious codes and intruders activates that threaten computer security. <br /><ul><li> Malicious Code Programs (Malware)
  23. 23. Viruses:
  24. 24. can be replicated by someone.
  25. 25. can not replicate itself.
  26. 26. can destroy data, crash systems</li></li></ul><li>Home Computer Security <br />Heriot-Watt University <br />Common Security Threats against Home Computer<br /><ul><li> Malicious Code Programs (Malware)
  27. 27. Worms:
  28. 28. can be replicated by someone.
  29. 29. can propagate itself.
  30. 30. can destroy data, crash systems.
  31. 31. Spywares /Adwares:
  32. 32. can open some ports on a victim system .
  33. 33. can give access permission for an Intruder.
  34. 34. can monitor a user’s activities and report the</li></ul> results to an Intruders.<br />
  35. 35. Home Computer Security <br />Heriot-Watt University <br />Common Security Threats against Home Computer<br /><ul><li> Hacking Strategies and Tools
  36. 36. Phishing :
  37. 37. Spoofing </li></li></ul><li>Home Computer Security <br />Heriot-Watt University <br />Protecting Home Computer<br /><ul><li> the Main steps to Protect Home Computer Data
  38. 38. Strong Computer System
  39. 39. Intelligent and Careful User
  40. 40. Strong Computer Security Tools</li></li></ul><li>Home Computer Security <br />Heriot-Watt University <br />Conclusions<br /><ul><li>This research indicates that home computer data is at risk. Therefore, users should pay attention to their computer security requirements. </li></li></ul><li>Home Computer Security <br />Heriot-Watt University <br />Thank You<br />?<br />

×