SlideShare a Scribd company logo
TEAM # 1
#101 Mohammed Aqib Rasheed
#102 Mohammed Talha Hamid
#103 Mohammed Faizan Iftikhar
TOPIC OF
PRESENTATION
CONTENT LIST
• BASIC SECURITY CONCEPT OF
COMPUTER.
• THREATS.
• THREATS TO COMPUTER HARDWARE.
• THREATS TO COMPUTER USER.
• THREATS TO COMPUTER DATA.
• VULNERABILITY AND
COUNTERMEASURE.
• SOFTWARE SECURITY.
• QUESTIONING SESSION.
BASIC SECURITY CONCEPT
OF COMPUTER
• WHAT IS COMPUTER SECURITY?
• IMPORTANCE OF COMPUTER SECURITY.
• COMPONENTS OF COMPUTER SECURITY.
1. THREATS.
2. VULNERABILITY.
3. COUNTER MEASURE.
THREATS TO COMPUTER
SECURITY
• DEFINE THREAT?
• TYPES OF THREAT.
1. THREATS TO COMPUTER HARDWARE.
2. THREATS TO COMPUTER USER.
3. THREATS TO COMPUTER DATA.
THREATS TO COMPUTER
HARDWARE
• POWER RELATED THREATS .
• THEFTS AND VANDALISM.
• DESASTER AND AGE.
POWER RELATED
THREATS
• POWER FLUCTUATION.
• POWER FAILURE.
• ELECTRICAL SURGE.
COUNTERMEASURE
AGAINST PRP
• SURGE SUPPRESSORS.
• LINE CONDITIONERS.
• UNINTERRUPTIBLE POWER SUPPLIES.
THEFT AND VANDALISM
• HARDWARE THEFT.
• HARDWARE VANDALISM.
1. DO TREMENDOUS DAMAGE.
2. LOSS OF SYSTEM.
3. LOSS OF STORAGE DATA.
COUNTERMEASURE AGAINST
THEFT AND VANDALISM
• PRECAUTIONS TO PROTECT PC.
• SECURE AREA.
• SPECIAL LOCKS.
• ALARM SYSTEM.
• CABELS.
DISASTER AND AGE
• EARTHQUACK, TSUNAMI.
• SNOWSTROMS, LIGHTINING, TORNEDO.
• SITE DISASTER.
• CIVIL DISASTER.
• AGE.
THREATS TO COMPUTER USER
• IDENTITY THEFTS.
• LOSS OF PRIVACY.
• ONLINE SPYING TOOLS.
• SPAMS.
• COMPUTER RELATED INJURIES.
IDENTITY THEFT
• USING NAME, SOCIAL SECURITY NUMBERS,
CREDIT CARD INFO.
• HACKS BANK ACCOUNTS, DRIVING LICENSE,
IMPORTANT DOCUMENTS.
• METHODS USED BY THEIVIES.
1. SHOULDER SURFING
2. SNAGGING.
3. DUMPSTER DIVING.
4. SOCIAL ENGINEERING.
5. HIGH-TECH METHODS.
LOSS OF PRIVACY
• DATA MINING AND ITS USE.
1. CRIMINAL RECORDS.
2. BACKGROUND INFORMATION.
3. ACCOUNT NUMBERS AND PASSWORDS.
ONLINE SPYING TOOLS
• INTERNET MONITORING.
• ONLINE PROFILING.
• COOKIES.
• WEB BUGS.
• SPYWARE.
SPAM
• UNSOLICITED COMMERCIAL E-MAIL.
• PERCENTAGE OF JUNK MAIL.
• SPAMMERS ACQUIRE ADDRESSES USING
MANY METHODS.
• CAN-SPAM ACT PASSED IN 2003.
• ANTI-SPAM SOFTWARES.
COMPUTER RELATED
INJURIES
• ERGONOMICS.
• RSI:
1. KEYBOARD INJURIES.
2. EYESTRAIN.
THREATS TO COMPUTER
DATA
IMPORTANCE OF DATA.
• TYPES OF DATA.
1. PERSONAL DATA.
2. FORMAL AND SECURITY DATA.
• THREATS TO DATA.
• PROTECTION OF DATA.
THREATS TO
COMPUTER DATA
• MALWARE,VIRUSES,MALICIOUS PROGRAMS.
• CYBER CRIME.
• HACKING.
• CYBERTERRORISM.
MALWARE
• WHAT IS MALWARE?
• THREAT TO DATA AND
INFORMATION.
• VIRUSES.
• WORMS.
• TROJAN HORSE ATTACK
APPLETS.
CYBERCRIME
• WHAT IS CYBERCRIME?
• A GROWING MENCE.
• CRIMINAL ACTIONS.
1. FRAUDULENT BANK WEBSITES.
2. CREDIT AND DEBIT FRAUD.
HACKING
• WHAT IS HACKING?
• EFFECT OF HACKING.
• DDOS ATTACKS.
• COMMON HACKING METHODS.
1. SNIFFING.
2. SOCIAL ENGINEERING.
3. SPOOFING.
CYBER TERRORISM
• WHAT IS CYBERWARFARE AND CYBERTERRORISM?
• CYBERTERRORISM COUNTERING.
• CIPB(CRITICAL INFRASTRUCTURE PROTECTION BOARD).
• CERT(COMPUTER EMERGENCY RESPONSE TEAM).
VULERABILITY AND
COUNTERMEASURE
• WHAT IS TERM VULNERABILITY?
• WHAT IS COUNTERMEASURE FOR
COMPUTER SECURITY?
• CLASSES OF COUNTERMEASURE.
1. SHIELDING FROM PERSONAL HARMS.
2. SAFGUARDING FROM PHYSICAL HAZARDS.
Software Security
What is a Software?
• Software, in simple words, is a collection
of instructions that enable the user to interact
with a computer, its hardware, or perform tasks.
Without software, computers would be useless.
• Examples are AVG, Windows 7, Outlook, Computer
drivers etc.
Types of Software
• There are two main types of software:-
1)Application software:
Application software are often called productivity
programs or end-user programs because they
enable the user to complete tasks such as
creating documents, spreadsheets, databases,
and publications, doing online research, sending
email, designing graphics etc.
Examples are Microsoft Excel, Outlook, Skype etc.
2) System Software:
Systems software includes the programs that are
dedicated to managing the computer itself,
such as the operating system, file management
utilities, and disk operating system (or
DOS). Without systems software installed in
our computers we would have to type the
instructions for everything we wanted the
computer to do!
Examples are Microsoft Windows, Mac OS X,
LINUX etc.
Software Security
• Software security:-
Software security is an idea implemented to protect
software against malicious attack and other
hacker risks so that the software continues to
function correctly under such potential risks.
Security is necessary to provide integrity,
authentication and availability.
• Why do we need software
security?
Any compromise to integrity, authentication and
availability makes a software unsecure. Software
systems can be attacked to steal information,
monitor content, introduce vulnerabilities and
damage the behavior of software. Malware can cause
DoS (denial of service) or crash the system itself.
Buffer overflow, stack overflow, command injection
and SQL injections are the most common attacks on
the software
• Command injection can be achieved on the
software code when system commands are used
predominantly. New system commands are
appended to existing commands by the malicious
attack.
• The only way to avoid such attacks is to practice
good programming techniques. System-level
security can be provided using better firewalls.
Using intrusion detection and prevention can also
aid in stopping attackers from easy access to the
system.
Pros and cons of
software security
• Advantages:
The advantages of software security are as
follows:-
1) Protects system against viruses, worms,
spyware and other unwanted programs.
2) Protection against data from theft.
3) Protects the computer from being hacked.
4) Minimizes computer freezing and crashes.
5) Gives privacy to users.
• Disadvantages:
Following are the disadvantages of software
security:-
1)Firewalls can be difficult to configure correctly.
2) Incorrectly configured firewalls may block
users from performing certain actions on the
Internet, until the firewall configured correctly.
3) Makes the system slower than before.
4) Need to keep updating the new software in
order to keep security up to date.
5) Could be costly for average user.
THANKS...

More Related Content

What's hot

Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
Rashmi Burugupalli
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Popescu Petre
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Cryptography
CryptographyCryptography
Virus
VirusVirus
Virus
Protik Roy
 
Operating system security
Operating system securityOperating system security
Operating system securitySarmad Makhdoom
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
Zaheer720515
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
Network security
Network securityNetwork security
Network security
Ali Kamil
 
Presentation on Web Attacks
Presentation on Web AttacksPresentation on Web Attacks
Presentation on Web Attacks
Vivek Sinha Anurag
 
Computer Security
Computer SecurityComputer Security
Computer Security
Cristian Mihai
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
Hansa Nidushan
 
User authentication
User authenticationUser authentication
User authentication
CAS
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Sagar Verma
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Email security
Email securityEmail security
Email security
Ahmed EL-KOSAIRY
 

What's hot (20)

Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Virus
VirusVirus
Virus
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Network security
Network securityNetwork security
Network security
 
Presentation on Web Attacks
Presentation on Web AttacksPresentation on Web Attacks
Presentation on Web Attacks
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
User authentication
User authenticationUser authentication
User authentication
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Cryptography
CryptographyCryptography
Cryptography
 
Email security
Email securityEmail security
Email security
 

Viewers also liked

Online spying tools
Online spying toolsOnline spying tools
Online spying tools
farazmajeed27
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Security testing
Security testingSecurity testing
Security testingbaskar p
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 
Gujrat
GujratGujrat
Gujrat
UOG
 

Viewers also liked (6)

Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Security testing
Security testingSecurity testing
Security testing
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Gujrat
GujratGujrat
Gujrat
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 

Similar to Basic Security Concepts of Computer

Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
BilalMehmood44
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
Cyber Security
Cyber SecurityCyber Security
Subhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptx
Subhankar26
 
Network security
Network securityNetwork security
Network security
hajra azam
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
PrabhatChoudhary11
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
Arun Velayudhan
 
NETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSESNETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSES
Sumit Pandey
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
Kabul Education University
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
dhumaletiku
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Abdul Rehman
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
AbhishekPadul1
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
Daniel Thomas
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...Graeme Wood
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 

Similar to Basic Security Concepts of Computer (20)

Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Subhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptx
 
Network security
Network securityNetwork security
Network security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
NETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSESNETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSES
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Brooks18
Brooks18Brooks18
Brooks18
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Cyber security
Cyber securityCyber security
Cyber security
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Basic Security Concepts of Computer

  • 1.
  • 2. TEAM # 1 #101 Mohammed Aqib Rasheed #102 Mohammed Talha Hamid #103 Mohammed Faizan Iftikhar
  • 4. CONTENT LIST • BASIC SECURITY CONCEPT OF COMPUTER. • THREATS. • THREATS TO COMPUTER HARDWARE. • THREATS TO COMPUTER USER. • THREATS TO COMPUTER DATA. • VULNERABILITY AND COUNTERMEASURE. • SOFTWARE SECURITY. • QUESTIONING SESSION.
  • 5. BASIC SECURITY CONCEPT OF COMPUTER • WHAT IS COMPUTER SECURITY? • IMPORTANCE OF COMPUTER SECURITY. • COMPONENTS OF COMPUTER SECURITY. 1. THREATS. 2. VULNERABILITY. 3. COUNTER MEASURE.
  • 6. THREATS TO COMPUTER SECURITY • DEFINE THREAT? • TYPES OF THREAT. 1. THREATS TO COMPUTER HARDWARE. 2. THREATS TO COMPUTER USER. 3. THREATS TO COMPUTER DATA.
  • 7. THREATS TO COMPUTER HARDWARE • POWER RELATED THREATS . • THEFTS AND VANDALISM. • DESASTER AND AGE.
  • 8. POWER RELATED THREATS • POWER FLUCTUATION. • POWER FAILURE. • ELECTRICAL SURGE.
  • 9. COUNTERMEASURE AGAINST PRP • SURGE SUPPRESSORS. • LINE CONDITIONERS. • UNINTERRUPTIBLE POWER SUPPLIES.
  • 10. THEFT AND VANDALISM • HARDWARE THEFT. • HARDWARE VANDALISM. 1. DO TREMENDOUS DAMAGE. 2. LOSS OF SYSTEM. 3. LOSS OF STORAGE DATA.
  • 11. COUNTERMEASURE AGAINST THEFT AND VANDALISM • PRECAUTIONS TO PROTECT PC. • SECURE AREA. • SPECIAL LOCKS. • ALARM SYSTEM. • CABELS.
  • 12. DISASTER AND AGE • EARTHQUACK, TSUNAMI. • SNOWSTROMS, LIGHTINING, TORNEDO. • SITE DISASTER. • CIVIL DISASTER. • AGE.
  • 13. THREATS TO COMPUTER USER • IDENTITY THEFTS. • LOSS OF PRIVACY. • ONLINE SPYING TOOLS. • SPAMS. • COMPUTER RELATED INJURIES.
  • 14. IDENTITY THEFT • USING NAME, SOCIAL SECURITY NUMBERS, CREDIT CARD INFO. • HACKS BANK ACCOUNTS, DRIVING LICENSE, IMPORTANT DOCUMENTS. • METHODS USED BY THEIVIES. 1. SHOULDER SURFING 2. SNAGGING. 3. DUMPSTER DIVING. 4. SOCIAL ENGINEERING. 5. HIGH-TECH METHODS.
  • 15. LOSS OF PRIVACY • DATA MINING AND ITS USE. 1. CRIMINAL RECORDS. 2. BACKGROUND INFORMATION. 3. ACCOUNT NUMBERS AND PASSWORDS.
  • 16. ONLINE SPYING TOOLS • INTERNET MONITORING. • ONLINE PROFILING. • COOKIES. • WEB BUGS. • SPYWARE.
  • 17. SPAM • UNSOLICITED COMMERCIAL E-MAIL. • PERCENTAGE OF JUNK MAIL. • SPAMMERS ACQUIRE ADDRESSES USING MANY METHODS. • CAN-SPAM ACT PASSED IN 2003. • ANTI-SPAM SOFTWARES.
  • 18. COMPUTER RELATED INJURIES • ERGONOMICS. • RSI: 1. KEYBOARD INJURIES. 2. EYESTRAIN.
  • 19. THREATS TO COMPUTER DATA IMPORTANCE OF DATA. • TYPES OF DATA. 1. PERSONAL DATA. 2. FORMAL AND SECURITY DATA. • THREATS TO DATA. • PROTECTION OF DATA.
  • 20. THREATS TO COMPUTER DATA • MALWARE,VIRUSES,MALICIOUS PROGRAMS. • CYBER CRIME. • HACKING. • CYBERTERRORISM.
  • 21. MALWARE • WHAT IS MALWARE? • THREAT TO DATA AND INFORMATION. • VIRUSES. • WORMS. • TROJAN HORSE ATTACK APPLETS.
  • 22. CYBERCRIME • WHAT IS CYBERCRIME? • A GROWING MENCE. • CRIMINAL ACTIONS. 1. FRAUDULENT BANK WEBSITES. 2. CREDIT AND DEBIT FRAUD.
  • 23. HACKING • WHAT IS HACKING? • EFFECT OF HACKING. • DDOS ATTACKS. • COMMON HACKING METHODS. 1. SNIFFING. 2. SOCIAL ENGINEERING. 3. SPOOFING.
  • 24. CYBER TERRORISM • WHAT IS CYBERWARFARE AND CYBERTERRORISM? • CYBERTERRORISM COUNTERING. • CIPB(CRITICAL INFRASTRUCTURE PROTECTION BOARD). • CERT(COMPUTER EMERGENCY RESPONSE TEAM).
  • 25. VULERABILITY AND COUNTERMEASURE • WHAT IS TERM VULNERABILITY? • WHAT IS COUNTERMEASURE FOR COMPUTER SECURITY? • CLASSES OF COUNTERMEASURE. 1. SHIELDING FROM PERSONAL HARMS. 2. SAFGUARDING FROM PHYSICAL HAZARDS.
  • 27. What is a Software? • Software, in simple words, is a collection of instructions that enable the user to interact with a computer, its hardware, or perform tasks. Without software, computers would be useless. • Examples are AVG, Windows 7, Outlook, Computer drivers etc.
  • 28. Types of Software • There are two main types of software:- 1)Application software: Application software are often called productivity programs or end-user programs because they enable the user to complete tasks such as creating documents, spreadsheets, databases, and publications, doing online research, sending email, designing graphics etc. Examples are Microsoft Excel, Outlook, Skype etc.
  • 29. 2) System Software: Systems software includes the programs that are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system (or DOS). Without systems software installed in our computers we would have to type the instructions for everything we wanted the computer to do! Examples are Microsoft Windows, Mac OS X, LINUX etc.
  • 30. Software Security • Software security:- Software security is an idea implemented to protect software against malicious attack and other hacker risks so that the software continues to function correctly under such potential risks. Security is necessary to provide integrity, authentication and availability.
  • 31. • Why do we need software security? Any compromise to integrity, authentication and availability makes a software unsecure. Software systems can be attacked to steal information, monitor content, introduce vulnerabilities and damage the behavior of software. Malware can cause DoS (denial of service) or crash the system itself. Buffer overflow, stack overflow, command injection and SQL injections are the most common attacks on the software
  • 32. • Command injection can be achieved on the software code when system commands are used predominantly. New system commands are appended to existing commands by the malicious attack. • The only way to avoid such attacks is to practice good programming techniques. System-level security can be provided using better firewalls. Using intrusion detection and prevention can also aid in stopping attackers from easy access to the system.
  • 33. Pros and cons of software security • Advantages: The advantages of software security are as follows:- 1) Protects system against viruses, worms, spyware and other unwanted programs. 2) Protection against data from theft. 3) Protects the computer from being hacked. 4) Minimizes computer freezing and crashes. 5) Gives privacy to users.
  • 34. • Disadvantages: Following are the disadvantages of software security:- 1)Firewalls can be difficult to configure correctly. 2) Incorrectly configured firewalls may block users from performing certain actions on the Internet, until the firewall configured correctly. 3) Makes the system slower than before. 4) Need to keep updating the new software in order to keep security up to date. 5) Could be costly for average user.
  • 35.