SlideShare a Scribd company logo
1 of 83
SAMINA KHAN
FAZAIA DEGREE COLLEGE RISALPUR
COMPUTER SECURITY
 Computer security refers to protecting
computer hardware, software and
information stored on computer from
threats .
Importance of computer
security
• Computer users often exchange
information or communicate over
internet.
• This can infect a user's computer with
virus or other types of malicious
software.
• Computer security or safety is
important for computer users to protect
their computers from different threats.
Cyber Crime
 cybercrime refers to any crime that is
committed by means of computer and
internet technology by having unlawful
access to other computers.
 Computer & internet have improved
our lives but the same technology is
also used by criminals to harm the
society.
SAMINA KHAN, FAZAIA DEGREE
COLLEGE RISALPUR
Cyber crime
 Cyber crime now include the activities
that cross international borders and
can be considered global epidemic.
SAMINA KHAN, FAZAIA DEGREE
COLLEGE RISALPUR
Cyber crime
 The following are the commonly
committed cyber crimes.
 Computers have been involved in
crimes such as fraud, kidnapping,
murder and stealing money from banks
 Criminals use internet to steal personnel
information of other users and commit
various types of cyber crime .
SAMINA KHAN, FAZAIA DEGREE
COLLEGE RISALPUR
Cyber crime
 Downloading illegal software, music
files and videos are also cybercrimes
 Internet harassment or cyber bullying
is also a serious crime
Hacker
 A person who illegally breaks into
others computer system is known as
hacker .
 Hacking is a cybercrime.
 Hackers are computer experts who try
to gain unauthorized access to
computer systems for stealing and
corrupting information.
 Most of the hackers break into
computers for financial benefits.
Hacker
 They have in-depth knowledge of
network programming and create
software to break into networks and
create problems.
Cracker
 Cracker is a computer user who
breaks into computer systems
without permission using hacking
tools for personal gain or damage
and commits cybercrimes.
 Most of the crackers do not have
professional computer skill to hack
 computer systems but they have
knowledge about using hacking tools.
Cracker
 Crackers break into computers and
cause serious damage.
 They also break into Web servers
and replace the home page of a
website with a page of their own
design.
 These criminals are dangerous and
harder to catch .
MALWARE AND ITS TYPES
 Malware is malicious software.
 It comprises of a number of harmful
software that are threat to all computer
users.
 Malware are created to attack on
privacy , destruction and financial
benefits.
 Worms, viruses, spyware. Adware are
different types of malware.
VIRUS
 A computer virus is a software
program that can get onto your
computer when you download a file
that contains the virus.
 It generates it’s copies and disturb
the activities of other program.
 It move with data from one
computer to another.
VIRUS
 It can spread through an email or it
connect with data and spread in your
computer.
WORMS
 A worm is a malware that transmits
itself over a network to infect other
computers.
 Worm can be harmful like a computer.
 It spreads automatically in computer
networks and replicates itself.
 It enters a computer through a
weakness in the operating system of
computer.
WORMS
 It can travel from computer to
computer without any human action.
SPYWARE
 Spyware programs are developed to
spy on computer users by gathering
information about their activities.
 When you download a software from
internet, spyware download with that
software without your knowledge.
 Steal passwords of computer.
 Access to bank account pin
SPYWARE
 Developed for the personal benefit of
the creator.
 Slow down the performance of
computer
ADWARE
ADWARE
 Adware is a malware software that
attaches itself to free software on the
internet.
 It pop up advertisements during
execution of the infected program.
 Pop-up block option in browsers helps
protect computer from adware.
 Collect user information without their
permission.
COMPUTER VIRUSES
COMPUTER VIRUSES
• Computer experts create malware such as
virus, worms, spyware etc and spread it
through internet.
• It is important to understand how malware
spreads and how to protect computer from
them.
How malware spreads?
• Malware can spread in computers through:
• Infected flash drives/CDs
• Pirated software
• Network and internet
• E-mail attachments
Common symptoms of malware
attacks
• The computer reboot automatically.
• Different types of error messages appear on
screen.
• Unexpected messages appear on screen.
• Programs don’t run in a normal way.
• Computer is running very slow.
• New files and folders are created on the hard
disk.
• Web browsers does not run properly.
System restart automatically
Effect of Malware on web browser
• Malware can hijack your browser to
redirect you to sites for its
purposes. Malware can infect your
computer and use it as a server to
broadcast various files or attacks.
• Browser hijacker is a malware program
that modifies web browser settings
without the user's permission and
redirects the user to websites the user
had not intended to visit.
PROTECTING COMPUTER FROM
MALWARE
• Install antivirus
• Install anti-spyware
Antivirus Software
• Antivirus software is a class of program
designed to prevent, detect and
remove malware infections.
• Antivirus software typically runs as a
background process, scanning computers to
detect and restrict the spread of malware.
Antivirus Software
• Since new infections are always being made
by PC programmers, antivirus programs must
keep an updated database of the most recent
malware codes.
• Most antivirus programs auto update the
infection database all the time.
• Whenever connect a USB or any other storage
device, must run antivirus software to ensure
that it does not contain any virus.
Antispyware software
• Anti-spyware programs help to block and
prevent spyware and other malware infections
on computers.
• These programs monitor incoming data from
e-mail, websites, and downloads of files and
stop spyware programs from getting in into
computer system.
Antispyware software
• This program runs in the background of
computer and continually scan spyware
threats.
AUTHENTICATION
MECHANICS
AUTHENTICATION MECHANICS
• Mechanics of user identification and
authentication.
AUTHENTICATION
Authentication mean identifying a person
based on a method such as:
USERNAME AND PASSWORD
PIN (PERSONNEL IDENTIFICATION NUMBER)
ACCESS CARD
BIOMETRICS
AUTHORIZATION
• Authorization mean to give someone
permission to do something
UNAUTHORIZED ACCESS
• If a person gains access to a
computer system without identity
approval then he has unauthorized
access which is crime
UNAUTHORIZED ACCESS
• If a person gains access to a
computer system without identity
approval then he has unauthorized
access which is crime
AUTHENTICATION
METHODOLOGIES
AUTHENTICATION
METHODOLOGIES
•The following are the common methodologies
used for authentication purpose.
 Username and password
 Pin (personnel identification number)
 Access card
 Biometric
USERNAME AND PASSWORD
USERNAME AND PASSWORD
• Username is a name that identifies a person
on a computer.
• It is used with a password.
• Username and password combination is
known as login information.
• Username and password are used to authorize
users to have access to computer, email
account, bank account and other services
available on computer.
USERNAME AND PASSWORD
• User name is known as part of login
information whereas password is secret.
PIN (PERSONNEL IDENTIFICATION
NUMBER)
PIN (PERSONNEL IDENTIFICATION
NUMBER)
PIN is a confidential numeric password used to
authenticate a user to get access to a computer.
When a user enter the PIN, it is searched in the
database stored in computer. If it matches, the
user is authorized.
PIN are commonly used with debit and credit in
retail stores.
It is also used with ATM cards to withdraw cash
from ATM.
ACCESS CARD
ACCESS CARD
Access cards are very similar in appearance to
the credit cards.
They do not require username, password or PIN.
They are commonly used to open security gates,
hotel rooms and to open barriers in parking.
They are an alternative to key.
BIOMETRICs
BIOMETRICs
• Biometric refers to authentication method
based on the physical characteristics of
individuals such as features of face, hand
geometry, retina ,voice and fingerprint.
• It provides highly secure identification and
personal verification technologies.
• Use for financial transactions, electronic
banking and personal data privacy.
MULTIMODEL
AUTHENTICATION
• Multimodal authentication is the combination of
two or more types of authentication methods .
• It uses multiple sources of information for
identification.
Multimodal biometrics
• Multimodal biometrics is the use of more
than one biometric modality simultaneously,
such as face and voice together, which
improves matching performance and makes
spoofing much more difficult.
COMPUTER ETHICS
•Computer Ethics mean an acceptable behavior
for using computer technology.
•It is a code of behavior for moral and social
issues while using computer technology,
particularly Internet.
•Computer user should be honest, respect the
rights of others on the Internet and obey laws
that apply to online behavior.
12/15/2020
COMPUTER ETHICS
•We should not use bad language while chatting
and social networking.
•We need to respect others views and should
not criticize people.
•We should not pretend as someone else and
fool others.
COMPUTER ETHICS
•We should not download copyrighted material
such as music, movies, etc.
•People should not do something on the
internet that is objectionable or illegal.
ETHICAL USE OF COMPUTER
•The following are some important moral
guidelines for ethical use of computer
technology.
•Computer should not be used to harm other
people.
•Computer users should not break into other
computer systems to steal, change or destroy
information.
ETHICAL USE OF COMPUTER
• Computer user should not read documents
and emails of other users without their
consent.
• People should not make illegal copies of
copyright software and sell it for financial
benefit.
•Computer user who have special computer
knowledge and ability should not create
malicious software and spread it to other
computers.
ETHICAL USE OF COMPUTER
•People should not
commit any type of
crime with the help of
computer technology.
•Computer users
should respect the
privacy of others.
AREAS OF COMPUTER ETHICS
•The following are the main areas if Computer
Ethics.
Information accuracy
Information ownership/intellectual rights
Intellectual property
Software piracy
Information privacy
Internet and privacy
Information Accuracy
• Information stored on
computer must be
accurate, up-to-date and
complete.
• If wrong information is
entered in computer, it
can be very harmful.
Information
ownership/intellectual rights
• It means persons who create ideas in any form
are the actual owners.
• Ideas can be poem, article, play, novel, film
and drawing.
• Intellectual rights protect creative work from
unauthorized access.
Intellectual property
• It means legal rights of an
individual or a corporation that
result from intellectual activity
in literary, artistic, scientific &
industrial fields.
• Countries have law to protect
intellectual property to foster
innovation and promote
creativity.
Software piracy
• It means making illegal copies of software for
use or sale for financial benefits.
• Software copyright law does not allow to
make illegal copies of software and install it on
other computers or sell it.
Information privacy
• It refers to an individual’s right to the privacy
of personal information.
• The Data Protection Act(law) protects the
rights of the individual against misuse of
personal information by organizations.
Internet and privacy
• Internet users enter personal
information in websites to sign
up register for services without
realizing that this may lead to
invasions of privacy.
• The information can be
accessed by hackers and used
for harmful purpose.
• This poses a serious threat to
privacy.
Computer security  & ethics

More Related Content

What's hot

Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hackingAyush Upadhyay
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 

What's hot (20)

Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Security threats
Security threatsSecurity threats
Security threats
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 

Similar to Computer security & ethics

Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeNithilan1
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Malware Detection By Machine Learning Presentation.pptx
Malware Detection By Machine Learning  Presentation.pptxMalware Detection By Machine Learning  Presentation.pptx
Malware Detection By Machine Learning Presentation.pptxalishapatidar2021
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 

Similar to Computer security & ethics (20)

Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Internet security
Internet securityInternet security
Internet security
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
cyber security
cyber security cyber security
cyber security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Malware Detection By Machine Learning Presentation.pptx
Malware Detection By Machine Learning  Presentation.pptxMalware Detection By Machine Learning  Presentation.pptx
Malware Detection By Machine Learning Presentation.pptx
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Computer security
Computer securityComputer security
Computer security
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
computer security
computer securitycomputer security
computer security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 

More from samina khan

UNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptxUNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptxsamina khan
 
INFORMATION TECHNOLOGY.pptx
INFORMATION TECHNOLOGY.pptxINFORMATION TECHNOLOGY.pptx
INFORMATION TECHNOLOGY.pptxsamina khan
 
scaffolding in teaching.pptx
scaffolding in teaching.pptxscaffolding in teaching.pptx
scaffolding in teaching.pptxsamina khan
 
REFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptxREFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptxsamina khan
 
PEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptxPEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptxsamina khan
 
What is an Autobiography?
 What is an Autobiography? What is an Autobiography?
What is an Autobiography?samina khan
 
Picture description
Picture descriptionPicture description
Picture descriptionsamina khan
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Websamina khan
 
Computer logic and gates
Computer logic and gatesComputer logic and gates
Computer logic and gatessamina khan
 
Computer networks
Computer networksComputer networks
Computer networkssamina khan
 
Classroom management
Classroom managementClassroom management
Classroom managementsamina khan
 
More on number system
More on number systemMore on number system
More on number systemsamina khan
 
Stress management
Stress managementStress management
Stress managementsamina khan
 
Classroom management
Classroom managementClassroom management
Classroom managementsamina khan
 
The future of technology
The future of technologyThe future of technology
The future of technologysamina khan
 
Lesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numbersLesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numberssamina khan
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7samina khan
 
Applications of computer
Applications of computerApplications of computer
Applications of computersamina khan
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitysamina khan
 

More from samina khan (20)

UNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptxUNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptx
 
INFORMATION TECHNOLOGY.pptx
INFORMATION TECHNOLOGY.pptxINFORMATION TECHNOLOGY.pptx
INFORMATION TECHNOLOGY.pptx
 
scaffolding in teaching.pptx
scaffolding in teaching.pptxscaffolding in teaching.pptx
scaffolding in teaching.pptx
 
REFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptxREFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptx
 
PEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptxPEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptx
 
What is an Autobiography?
 What is an Autobiography? What is an Autobiography?
What is an Autobiography?
 
Picture description
Picture descriptionPicture description
Picture description
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Computer logic and gates
Computer logic and gatesComputer logic and gates
Computer logic and gates
 
Problem solving
Problem solvingProblem solving
Problem solving
 
Computer networks
Computer networksComputer networks
Computer networks
 
Classroom management
Classroom managementClassroom management
Classroom management
 
More on number system
More on number systemMore on number system
More on number system
 
Stress management
Stress managementStress management
Stress management
 
Classroom management
Classroom managementClassroom management
Classroom management
 
The future of technology
The future of technologyThe future of technology
The future of technology
 
Lesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numbersLesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numbers
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 

Recently uploaded

Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 

Recently uploaded (20)

Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 

Computer security & ethics

  • 1.
  • 2. SAMINA KHAN FAZAIA DEGREE COLLEGE RISALPUR
  • 3. COMPUTER SECURITY  Computer security refers to protecting computer hardware, software and information stored on computer from threats .
  • 4. Importance of computer security • Computer users often exchange information or communicate over internet. • This can infect a user's computer with virus or other types of malicious software. • Computer security or safety is important for computer users to protect their computers from different threats.
  • 5.
  • 6.
  • 7. Cyber Crime  cybercrime refers to any crime that is committed by means of computer and internet technology by having unlawful access to other computers.  Computer & internet have improved our lives but the same technology is also used by criminals to harm the society. SAMINA KHAN, FAZAIA DEGREE COLLEGE RISALPUR
  • 8. Cyber crime  Cyber crime now include the activities that cross international borders and can be considered global epidemic. SAMINA KHAN, FAZAIA DEGREE COLLEGE RISALPUR
  • 9. Cyber crime  The following are the commonly committed cyber crimes.  Computers have been involved in crimes such as fraud, kidnapping, murder and stealing money from banks  Criminals use internet to steal personnel information of other users and commit various types of cyber crime . SAMINA KHAN, FAZAIA DEGREE COLLEGE RISALPUR
  • 10. Cyber crime  Downloading illegal software, music files and videos are also cybercrimes  Internet harassment or cyber bullying is also a serious crime
  • 11.
  • 12. Hacker  A person who illegally breaks into others computer system is known as hacker .  Hacking is a cybercrime.  Hackers are computer experts who try to gain unauthorized access to computer systems for stealing and corrupting information.  Most of the hackers break into computers for financial benefits.
  • 13. Hacker  They have in-depth knowledge of network programming and create software to break into networks and create problems.
  • 14. Cracker  Cracker is a computer user who breaks into computer systems without permission using hacking tools for personal gain or damage and commits cybercrimes.  Most of the crackers do not have professional computer skill to hack  computer systems but they have knowledge about using hacking tools.
  • 15. Cracker  Crackers break into computers and cause serious damage.  They also break into Web servers and replace the home page of a website with a page of their own design.  These criminals are dangerous and harder to catch .
  • 16.
  • 17. MALWARE AND ITS TYPES  Malware is malicious software.  It comprises of a number of harmful software that are threat to all computer users.  Malware are created to attack on privacy , destruction and financial benefits.  Worms, viruses, spyware. Adware are different types of malware.
  • 18.
  • 19. VIRUS  A computer virus is a software program that can get onto your computer when you download a file that contains the virus.  It generates it’s copies and disturb the activities of other program.  It move with data from one computer to another.
  • 20. VIRUS  It can spread through an email or it connect with data and spread in your computer.
  • 21. WORMS  A worm is a malware that transmits itself over a network to infect other computers.  Worm can be harmful like a computer.  It spreads automatically in computer networks and replicates itself.  It enters a computer through a weakness in the operating system of computer.
  • 22. WORMS  It can travel from computer to computer without any human action.
  • 23.
  • 24. SPYWARE  Spyware programs are developed to spy on computer users by gathering information about their activities.  When you download a software from internet, spyware download with that software without your knowledge.  Steal passwords of computer.  Access to bank account pin
  • 25. SPYWARE  Developed for the personal benefit of the creator.  Slow down the performance of computer
  • 27.
  • 28. ADWARE  Adware is a malware software that attaches itself to free software on the internet.  It pop up advertisements during execution of the infected program.  Pop-up block option in browsers helps protect computer from adware.  Collect user information without their permission.
  • 29.
  • 31. COMPUTER VIRUSES • Computer experts create malware such as virus, worms, spyware etc and spread it through internet. • It is important to understand how malware spreads and how to protect computer from them.
  • 32. How malware spreads? • Malware can spread in computers through: • Infected flash drives/CDs • Pirated software • Network and internet • E-mail attachments
  • 33.
  • 34.
  • 35. Common symptoms of malware attacks • The computer reboot automatically. • Different types of error messages appear on screen. • Unexpected messages appear on screen. • Programs don’t run in a normal way. • Computer is running very slow. • New files and folders are created on the hard disk. • Web browsers does not run properly.
  • 37. Effect of Malware on web browser • Malware can hijack your browser to redirect you to sites for its purposes. Malware can infect your computer and use it as a server to broadcast various files or attacks. • Browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
  • 38.
  • 39.
  • 40. PROTECTING COMPUTER FROM MALWARE • Install antivirus • Install anti-spyware
  • 41. Antivirus Software • Antivirus software is a class of program designed to prevent, detect and remove malware infections. • Antivirus software typically runs as a background process, scanning computers to detect and restrict the spread of malware.
  • 42. Antivirus Software • Since new infections are always being made by PC programmers, antivirus programs must keep an updated database of the most recent malware codes. • Most antivirus programs auto update the infection database all the time. • Whenever connect a USB or any other storage device, must run antivirus software to ensure that it does not contain any virus.
  • 43.
  • 44. Antispyware software • Anti-spyware programs help to block and prevent spyware and other malware infections on computers. • These programs monitor incoming data from e-mail, websites, and downloads of files and stop spyware programs from getting in into computer system.
  • 45. Antispyware software • This program runs in the background of computer and continually scan spyware threats.
  • 47. AUTHENTICATION MECHANICS • Mechanics of user identification and authentication.
  • 48. AUTHENTICATION Authentication mean identifying a person based on a method such as: USERNAME AND PASSWORD PIN (PERSONNEL IDENTIFICATION NUMBER) ACCESS CARD BIOMETRICS
  • 49.
  • 50. AUTHORIZATION • Authorization mean to give someone permission to do something
  • 51.
  • 52.
  • 53. UNAUTHORIZED ACCESS • If a person gains access to a computer system without identity approval then he has unauthorized access which is crime
  • 54. UNAUTHORIZED ACCESS • If a person gains access to a computer system without identity approval then he has unauthorized access which is crime
  • 56. AUTHENTICATION METHODOLOGIES •The following are the common methodologies used for authentication purpose.  Username and password  Pin (personnel identification number)  Access card  Biometric
  • 58. USERNAME AND PASSWORD • Username is a name that identifies a person on a computer. • It is used with a password. • Username and password combination is known as login information. • Username and password are used to authorize users to have access to computer, email account, bank account and other services available on computer.
  • 59. USERNAME AND PASSWORD • User name is known as part of login information whereas password is secret.
  • 61. PIN (PERSONNEL IDENTIFICATION NUMBER) PIN is a confidential numeric password used to authenticate a user to get access to a computer. When a user enter the PIN, it is searched in the database stored in computer. If it matches, the user is authorized. PIN are commonly used with debit and credit in retail stores. It is also used with ATM cards to withdraw cash from ATM.
  • 63. ACCESS CARD Access cards are very similar in appearance to the credit cards. They do not require username, password or PIN. They are commonly used to open security gates, hotel rooms and to open barriers in parking. They are an alternative to key.
  • 65. BIOMETRICs • Biometric refers to authentication method based on the physical characteristics of individuals such as features of face, hand geometry, retina ,voice and fingerprint. • It provides highly secure identification and personal verification technologies. • Use for financial transactions, electronic banking and personal data privacy.
  • 66. MULTIMODEL AUTHENTICATION • Multimodal authentication is the combination of two or more types of authentication methods . • It uses multiple sources of information for identification.
  • 67. Multimodal biometrics • Multimodal biometrics is the use of more than one biometric modality simultaneously, such as face and voice together, which improves matching performance and makes spoofing much more difficult.
  • 68.
  • 69. COMPUTER ETHICS •Computer Ethics mean an acceptable behavior for using computer technology. •It is a code of behavior for moral and social issues while using computer technology, particularly Internet. •Computer user should be honest, respect the rights of others on the Internet and obey laws that apply to online behavior.
  • 71. COMPUTER ETHICS •We should not use bad language while chatting and social networking. •We need to respect others views and should not criticize people. •We should not pretend as someone else and fool others.
  • 72. COMPUTER ETHICS •We should not download copyrighted material such as music, movies, etc. •People should not do something on the internet that is objectionable or illegal.
  • 73. ETHICAL USE OF COMPUTER •The following are some important moral guidelines for ethical use of computer technology. •Computer should not be used to harm other people. •Computer users should not break into other computer systems to steal, change or destroy information.
  • 74. ETHICAL USE OF COMPUTER • Computer user should not read documents and emails of other users without their consent. • People should not make illegal copies of copyright software and sell it for financial benefit. •Computer user who have special computer knowledge and ability should not create malicious software and spread it to other computers.
  • 75. ETHICAL USE OF COMPUTER •People should not commit any type of crime with the help of computer technology. •Computer users should respect the privacy of others.
  • 76. AREAS OF COMPUTER ETHICS •The following are the main areas if Computer Ethics. Information accuracy Information ownership/intellectual rights Intellectual property Software piracy Information privacy Internet and privacy
  • 77. Information Accuracy • Information stored on computer must be accurate, up-to-date and complete. • If wrong information is entered in computer, it can be very harmful.
  • 78. Information ownership/intellectual rights • It means persons who create ideas in any form are the actual owners. • Ideas can be poem, article, play, novel, film and drawing. • Intellectual rights protect creative work from unauthorized access.
  • 79. Intellectual property • It means legal rights of an individual or a corporation that result from intellectual activity in literary, artistic, scientific & industrial fields. • Countries have law to protect intellectual property to foster innovation and promote creativity.
  • 80. Software piracy • It means making illegal copies of software for use or sale for financial benefits. • Software copyright law does not allow to make illegal copies of software and install it on other computers or sell it.
  • 81. Information privacy • It refers to an individual’s right to the privacy of personal information. • The Data Protection Act(law) protects the rights of the individual against misuse of personal information by organizations.
  • 82. Internet and privacy • Internet users enter personal information in websites to sign up register for services without realizing that this may lead to invasions of privacy. • The information can be accessed by hackers and used for harmful purpose. • This poses a serious threat to privacy.