This document discusses computer security risks. It defines computer security risks as events that could cause loss or damage to computer systems. It then identifies and describes various types of security risks like internet and network attacks (e.g. malware, botnets, denial of service attacks), unauthorized access, hardware and software theft, information theft, and system failures. Specific malware types are also defined, including viruses, worms, Trojan horses, rootkits, and spyware.
The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own disadvantages is cyber crime- illegal activity committed on the internet.
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
Hacking
History Of Hacking
Types of Hacking
The Most World’s famous Hackers
Types Of Hackers
Scope Of Ethical Hackers
Cyber Laws for Hacking and their Punishments in Pakistan
How to Prevent Hacking
The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own disadvantages is cyber crime- illegal activity committed on the internet.
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
Hacking
History Of Hacking
Types of Hacking
The Most World’s famous Hackers
Types Of Hackers
Scope Of Ethical Hackers
Cyber Laws for Hacking and their Punishments in Pakistan
How to Prevent Hacking
Being aware of online and malware threats is the first step to computer security. In this presentation, we help you understand:
a. Importance of computer security
b. Consequences of ignoring computer security
c. Types of threats that can harm your computer
d. Measures to take to keep your computer safe
e. How can Quick Heal help
Introduction
What is Cyber Crime?
Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
What is Cyber Security?
C
yber security, also known as computer security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection and due to malpractice by operators,whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
The field is of growing importance due to the increasing reliance on computer systems in most societies and the growth of "smart" devices,including smartphones, televisions and tiny devices as part of the Internet of Things – and of the Internet and wireless network such as Bluetooth and Wi-Fi.
Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.
Vulnerabilities and Attacks
Vulnerability is a system susceptibility or flaw, and much vulnerability are documented in the Common Vulnerabilities and Exposures (CVE) database and vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities as they are discovered.
An exploitable vulnerability is one for which at least one working attack or "exploit" exists.
To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the categories below.
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e
1. Security Attacks and Threats
2. Security Services
3. Security Mechanisms
Along with that we've also includes Security Awareness and Security Policies
In a world so connected, cyber security awareness is key to a safe online experience, because the weakest information security link to any organisation is the users of technology. This presentation speaks to basic cyber security awareness for everyday internet users
Internet security is a branch of computer security specifically involving browser security but also network security on a more general level.
Contents:
Intro...
Need..
Security Related Threats
-Hijacked web servers
-Denial-of-Service Attacks
-Cross Site Scripting
-Trap Doors
-Email Spoofing
Conclusions...
Computer security threats & prevention,Its a proper introduction about computer security and threats and prevention with reference. Have info about threats and their prevention.
Being aware of online and malware threats is the first step to computer security. In this presentation, we help you understand:
a. Importance of computer security
b. Consequences of ignoring computer security
c. Types of threats that can harm your computer
d. Measures to take to keep your computer safe
e. How can Quick Heal help
Introduction
What is Cyber Crime?
Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
What is Cyber Security?
C
yber security, also known as computer security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection and due to malpractice by operators,whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
The field is of growing importance due to the increasing reliance on computer systems in most societies and the growth of "smart" devices,including smartphones, televisions and tiny devices as part of the Internet of Things – and of the Internet and wireless network such as Bluetooth and Wi-Fi.
Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.
Vulnerabilities and Attacks
Vulnerability is a system susceptibility or flaw, and much vulnerability are documented in the Common Vulnerabilities and Exposures (CVE) database and vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities as they are discovered.
An exploitable vulnerability is one for which at least one working attack or "exploit" exists.
To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the categories below.
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e
1. Security Attacks and Threats
2. Security Services
3. Security Mechanisms
Along with that we've also includes Security Awareness and Security Policies
In a world so connected, cyber security awareness is key to a safe online experience, because the weakest information security link to any organisation is the users of technology. This presentation speaks to basic cyber security awareness for everyday internet users
Internet security is a branch of computer security specifically involving browser security but also network security on a more general level.
Contents:
Intro...
Need..
Security Related Threats
-Hijacked web servers
-Denial-of-Service Attacks
-Cross Site Scripting
-Trap Doors
-Email Spoofing
Conclusions...
Computer security threats & prevention,Its a proper introduction about computer security and threats and prevention with reference. Have info about threats and their prevention.
F. Questier, Computer security, workshop for Lib@web international training program 'Management of Electronic Information and Digital Libraries', university of Antwerp, October 2015
details of tools and methods used in cyber crime & how to protect your system from crimes...
detail study of password cracking, Denial of service, DDoS, steganography, keylogger, proxy server, phishing etc..
we have made this like computer application course material which is so functionable and any one can use it to develop your technological concept skill.
We Belete And Tadelech
2. LEARNING OUTCOMES:
At the end of this topic, students should
be able to:
Define computer security risks.
Identify types of security risks.
2
3. DEFINITION
• Computer Security Risks
is any event or action that could
cause a loss of or damage to
computer hardware, software, data,
information, or processing
capability.
3
5. Types of Computer Security Risks
Internet and network attack
Unauthorized access and use
Hardware theft
Software theft
Information theft
System failure
5
6. 1. Internet and network attacks
• Information transmitted over networks has a higher
degree of security risk than information kept on an
organization’s premises.
7. 1. Malware 5. Spoofing
Internet and
network attacks
2. Botnets 4. Denial of service attacks
3. Back Doors
7
8. 1a.Malware
• Malware (malicious software) – which are
program that act without a user’s knowledge and
deliberately alter the computer operation.
• Type of malware:
i. Computer viruses
ii. Worms
iii. Trojan Horses
iv. Rootkit
v. Back door
vi. Spyware
9. Malware
Symptoms Malware
• Operating system runs much slower than usual
• Available memory is less than expected
• Files become corrupted
• Screen displays unusual message or image
• Music or unusual sound plays randomly
• Existing programs and files disappear
9
10. Malware
Symptoms Malware
• Programs or files do not work properly
• Unknown programs or files mysteriously appear
• System properties change
• Operating system does not start up
• Operating system shuts down unexpectedly
10
11. Malware
1. Worm
Is a program that copies itself repeatedly, for
example in memory or on a network, using up
resources and possibly shutting down the
computer or network.
11
12. Malware
2. Computer Virus
is a potentially damaging computer program
that affects, or infects, a computer negatively by
altering the way the computer works without the
user’s knowledge or permission.
12
13. Malware
2. Computer Virus
it can spread throughout and may damage files
and system software, including the operating
system.
13
14. Internet and network attacks
Malware
3. Trojan horse
Is a program that hides within or looks like a
legitimate program. It does not replicate itself
to other computers.
14
15. Internet and network attacks
Malware
3. Trojan horse
it can spread throughout and may damage files
and system software, including the operating
system.
15
16. Internet and network attacks
Malware
4. Rootkit
•Is a program that hides in a computer and allows
someone from a remote location to take full control
of the computer.
•The rootkit author can execute programs, change
settings, monitor activity, and access files on the
remote computer
16
17. Internet and network attacks
Malware
5. Spyware & Adware
• Spyware is a program placed on a computer
without the users knowledge that secretly collects
information about the user.
• Adware is a program that displays an online
advertisement in a banner or pop-up window on
web pages, e-mail messages or other internet
services
17
18. 1b.Botnets
• a group of compromised computers
connected to a network such as the Internet
that are used as part of a network that attacks
other networks, usually for nefarious
purposes.
19. 1c.Back Door
• A program or set of instructions in a program
that allow users to bypass security controls
when accessing a program, computer, or
network
20. 1d.Denial of Service Attacks
Denial of service attacks or DoS attack, is
an assault whose purpose is to disrupt
computer access to an Internet service such
as the Web or e-mail.
21. 1e.Spoofing
• A technique intruders use to make their
network or Internet transmission appear
legitimate to a victim computer or network.
22. 2.Unauthorized Access and Use
Unauthorized access
The use of a computer or network without permission.
Unauthorized use
The use of a computer or its data for unapproved or
possibly illegal activities.
23. 3.Hardware Theft and Vandalism
Hardware theft
Is the act of stealing computer equipment.
Hardware vandalism
The act of defacing or destroying computer
equipment.
24. 4.Software Theft
Steals Intentionally
software erases
media programs
Illegally
Illegally registers
copies a and/or
program activates a
program
25. 5.Information Theft
Occurs when someone steals personal or
confidential information.
If stolen, the loss of information can cause as
much damage as (if not more than) hardware or
software theft.
26. System Failure
A system failure is the prolonged malfunction of a
computer
A variety of factors can lead to system failure,
including:
• Aging hardware
• Natural disasters
• Electrical power problems
• Noise, undervoltages, and overvoltages
• Errors in computer programs