SlideShare a Scribd company logo
Computer Security Basics
Computer Security
Computer Security is the protection of
computing systems and the data that they store
or access.
• Computer security, also known as
cyber security or IT security, is the
protection
of computer systems from the theft or damage
to their hardware, software or information.
Different Elements in Computer
Security (CIA)
Different Elements in Computer
Security
Confidentiality
• Confidentiality is the concealment of information
or resources.
Integrity
• Integrity is the trustworthiness of data in the
systems or resources by the point of view of
preventing unauthorized and improper changes.
Availability
Availability refers to the ability to access data of a
resource when it is needed, as such the information
has value only if the authorize ie can access at right
time.
Different terminology used in
Computer Security
 Unauthorized access — An unauthorized access is when
someone gains access to a server, website, or other sensitive data
using someone else's account details.
 Hacker — Is a Person who tries and exploits a computer system
for a reason which can be money, a social cause, fun etc.
 Threat — Is an action or event that might compromise the security.
 Vulnerability — It is a weakness, a design problem or
implementation error in a system that can lead to an unexpected
and undesirable event regarding security system.
 Attack — is an as sault on the system security that is made by a
person or a machine to a system.
Different terminology used in
Computer Security
 Antivirus or Antimalware — Is a software that operates
on different OS which is used to prevent from malicious
software.
 Social Engineering— Is a technique that a hacker uses to steal
data from a person for different purposes by psychological
manipulation combined with social scenes.
 Virus — Itis a malicious software that installs on your
computer without your consent for a bad purpose. They can
damage or delete files, Slow down your computer and Invade
your emails.
Virus
 A computer virus is a type malware that, when executed,
replicates itself by modifying other computer programs and
inserting its own code.
 A computer virus is written to alter the way a computer
operates and that is designed to spread from one computer to
another.
Virus
How do computer viruses spread?
 Email and text message attachments
 Internet file downloads
 Social media links
 Mobile devices and smart phones can become infected with
mobile viruses through shady App downloads.
 As attach ments of socially shareable content such as funny
images, greeting cards, or audio and video files.
 Inserting or connecting an infected disk, disc, or drive
 un known links
Virus
Possible effects of virus attack on a computer
 Delete data
 Overwrite information
 Display messages
 Add itself to other files on the computer
 Stealing passwords or data
 Logging keystrokes
 Corrupting files
 spamming email contacts
 even taking over the machine
Hacking
• Hacking means using computers to commit
fraudulent acts such as fraud, privacy invasion, stealing
corporate/personal data, etc.
• A Hacker is a person who finds and exploits the
weakness in computer systems and/or networks to
gain access. Hackers are usually skilled computer
programmers with knowledge of computer
security.
Ethical Hacking
Identifying weakness in computer systems and/or
computer networks and coming with counter
measures that protect the weaknesses.
Ethical hackers must abide by the following rules.
• Get written permission from the owner of the
computer system and/or computer network before
hacking.
• Protect the privacy of the organization been hacked.
• Transparently report all the identified weaknesses in
the computer system to the organization.
Cyber crime
• Cyber crime is the use of computers and
networks to perform illegal activities such as
spreading computer viruses, online bullying,
performing unauthorized electronic fund
transfers, etc.
• Most cybercrimes are committed through the
internet.
• Some cybercrimes can also be carried out using
Mobile phones via SMS and online chatting
applications.
Types of Cybercrime
Privacy violation: Exposing personal information such as email
addresses, phone number, account details, etc. on social media,
websites, etc.
Identity Thefi: Stealing personal information from somebody and
impersonating that person.
Sharing copyrighted files/information: This involves distributing
copyright protected files such as eBooks and computer programs
etc.
Electronic funds transfer: This involves gaining an un-authorized
access to bank computer networks and making illegal fund
transfers.
ATM Fraud: This involves intercepting ATM card details such as
account number and PIN numbers. These details are then used to
withdraw funds from the intercepted accounts.
Spamming: unauthorized emails. These emails usually contain
advertisement.
Cyber crime
Anti—virus
Anti—virus software is a program or set of programs that
are designed to prevent, search for, detect, and remove
software viruses.
There are several different companies that build and offer
anti—virus software and what each offers can vary but all
perform some basic functions:
• Scan specific files or directories for any malware or known
malicious patterns.
• Allow you to schedule scans to automatically run for you.
• Allow you to initiate a scan of a specific file or of your
computer, or of
• a CD or flash drive at any time.
• Remove any malicious code detected —sometimes you will be
notified of an infection and asked if you want to clean the file,
other programs will automatically do this behind the scenes.
• Show you the ‘health' of your computer
Spyware
• Spyware is software that aims to gather
information about a person or organization
without their knowledge, that may send such
information to another entity without the
consumer's consent.
• "Spyware" is mostly classified into four
types:
 Adware.,
 System monitors,
 Tracking cookies, and
 Trojans;
• Spyware that is installed for innocuous reasons is
sometimes referred to as tracking software.
Spyware
• Spyware can collect almost any type of data,
including personal information like internet
searching habits, user logins, and bank or credit
account information.
• Spyware can also interfere with a user's control
of a computer by installing additional software or
redirecting users.
• Some spyware can change computer settings,
which can result in slow Internet connection
speeds, un—authorized changes in browser
settings, or changes to software settings.
How to recognize Spyware
• New and/or unidentifiable icons may appear in the task
bar at the bottom of your screen.
• Searches may result in you being redirected to a
different search engine.
• Random error messages appear when you
perform operations that previously worked fine.
• But the best way to identify if you have been
infected is to use a spyware scan ner, which will be
included in any spyware removal software.
Firewall
• In column, a firewall is a network
security system that monitors and controls the
incoming and outgoing network traffic based on
predetermined security rules.
• A firewall acts as a barrier between a trusted
network and non—trusted network.
• This means that the only traffic allowed onto the
network is defined in the firewall policy; all other
traffic is denied.
Measures to keep your
system and data safe
• Computer Application White listening —
install just a restricted
number of applications in your computers, which are
useful as well as are genuine.
• Computer System Restore Solution — If computer is
hacked and your files are damaged, you should have the
possibility to again have access to your files. An example is
Windows System Restore or Backup.
• Computer and Network Authentication — The data that is
accessed over the network is best to be provided only to the
authorized users. Usernames and passwords!!!
• Update Your Software. Keep your software including your
operating system, the web browsers you use to connect to the
Internet, and your apps up to date to protect against the latest
threats.
 Protect Your Personal Information. Don't hand it
out to just anyone.
 Your Social Security number, credit card
numbers, and bank and utility account numbers
can be used to steal your money or open new
accounts in your name.
 So every time you are asked for your personal
information — whether in a web form, an email,
a text, or a phone message think about why
someone needs it and whether you can really
trust the request.
Measures to keep your
system and data safe
KEEP IN MIND
• Use strong password
• Use authorized Websites
• Keep your Computer Screen locked
• Take timely back-ups
• Think twice before posting on Social
Media.
CYBER LAWS
IN INDIA
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx

More Related Content

What's hot

Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 
Network security
Network securityNetwork security
Network security
Nkosinathi Lungu
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Firewall
FirewallFirewall
Firewall
sajeena81
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
Network Security
Network SecurityNetwork Security
Network Security
Raymond Jose
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security controlCheng Olayvar
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
sharmaakash1881
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
Rishab garg
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
introduccion Hacking etico
introduccion Hacking eticointroduccion Hacking etico
introduccion Hacking etico
Yulder Bermeo
 
Computer security
Computer securityComputer security
Computer security
Mahesh Singh Madai
 
information security management
information security managementinformation security management
information security management
Gurpreetkaur838
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina
 

What's hot (20)

Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Network security
Network securityNetwork security
Network security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Firewall
FirewallFirewall
Firewall
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Network Security
Network SecurityNetwork Security
Network Security
 
Informacijos apsauga
Informacijos apsaugaInformacijos apsauga
Informacijos apsauga
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
introduccion Hacking etico
introduccion Hacking eticointroduccion Hacking etico
introduccion Hacking etico
 
Computer security
Computer securityComputer security
Computer security
 
information security management
information security managementinformation security management
information security management
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

Similar to BCE L-3omputer security Basics.pptx

Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
MeesanRaza
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
JoelGautham
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
SoniaTaryal
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
CabdullhiY
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
MuhammadRehan856177
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
MuhammadRehan856177
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
Hannah323676
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
AmolKumarPandey2
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
Sifat Hossain
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
kiran yadav
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
TuhinUtsabPaul
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 

Similar to BCE L-3omputer security Basics.pptx (20)

Computer security
Computer securityComputer security
Computer security
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 

More from Kirti Verma

L-5 BCEProcess management.ppt
L-5 BCEProcess management.pptL-5 BCEProcess management.ppt
L-5 BCEProcess management.ppt
Kirti Verma
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.ppt
Kirti Verma
 
L-4 BCE Generations of Computers final.ppt
L-4 BCE Generations of Computers final.pptL-4 BCE Generations of Computers final.ppt
L-4 BCE Generations of Computers final.ppt
Kirti Verma
 
L-1 BCE computer fundamentals final kirti.ppt
L-1 BCE computer fundamentals final kirti.pptL-1 BCE computer fundamentals final kirti.ppt
L-1 BCE computer fundamentals final kirti.ppt
Kirti Verma
 
BCE L-4 Data Type In C++.ppt
BCE L-4 Data Type In C++.pptBCE L-4 Data Type In C++.ppt
BCE L-4 Data Type In C++.ppt
Kirti Verma
 
BCE L-3 overview of C++.ppt
BCE L-3 overview of C++.pptBCE L-3 overview of C++.ppt
BCE L-3 overview of C++.ppt
Kirti Verma
 
BCE L-2 Algorithms-and-Flowchart-ppt.ppt
BCE L-2 Algorithms-and-Flowchart-ppt.pptBCE L-2 Algorithms-and-Flowchart-ppt.ppt
BCE L-2 Algorithms-and-Flowchart-ppt.ppt
Kirti Verma
 
BCE L-1 Programmimg languages.pptx
BCE L-1  Programmimg languages.pptxBCE L-1  Programmimg languages.pptx
BCE L-1 Programmimg languages.pptx
Kirti Verma
 
BCE L-1 networking fundamentals 111.pptx
BCE L-1  networking fundamentals 111.pptxBCE L-1  networking fundamentals 111.pptx
BCE L-1 networking fundamentals 111.pptx
Kirti Verma
 
BCE L-2 e commerce.pptx
BCE L-2 e commerce.pptxBCE L-2 e commerce.pptx
BCE L-2 e commerce.pptx
Kirti Verma
 
L 5 Numpy final ppt kirti.pptx
L 5 Numpy final ppt kirti.pptxL 5 Numpy final ppt kirti.pptx
L 5 Numpy final ppt kirti.pptx
Kirti Verma
 
L 2 Introduction to Data science final kirti.pptx
L 2 Introduction to Data science final kirti.pptxL 2 Introduction to Data science final kirti.pptx
L 2 Introduction to Data science final kirti.pptx
Kirti Verma
 
Pandas Dataframe reading data Kirti final.pptx
Pandas Dataframe reading data  Kirti final.pptxPandas Dataframe reading data  Kirti final.pptx
Pandas Dataframe reading data Kirti final.pptx
Kirti Verma
 
L 8 introduction to machine learning final kirti.pptx
L 8 introduction to machine learning final kirti.pptxL 8 introduction to machine learning final kirti.pptx
L 8 introduction to machine learning final kirti.pptx
Kirti Verma
 
L 6.1 complete scikit libraray.pptx
L 6.1 complete scikit libraray.pptxL 6.1 complete scikit libraray.pptx
L 6.1 complete scikit libraray.pptx
Kirti Verma
 
L 7Complete Machine learning.pptx
L 7Complete Machine learning.pptxL 7Complete Machine learning.pptx
L 7Complete Machine learning.pptx
Kirti Verma
 
Introduction to python history and platforms
Introduction to python history and platformsIntroduction to python history and platforms
Introduction to python history and platforms
Kirti Verma
 
Informed Search Techniques new kirti L 8.pptx
Informed Search Techniques new kirti L 8.pptxInformed Search Techniques new kirti L 8.pptx
Informed Search Techniques new kirti L 8.pptx
Kirti Verma
 
Production System l 10.pptx
Production System l 10.pptxProduction System l 10.pptx
Production System l 10.pptx
Kirti Verma
 
Breath first Search and Depth first search
Breath first Search and Depth first searchBreath first Search and Depth first search
Breath first Search and Depth first search
Kirti Verma
 

More from Kirti Verma (20)

L-5 BCEProcess management.ppt
L-5 BCEProcess management.pptL-5 BCEProcess management.ppt
L-5 BCEProcess management.ppt
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.ppt
 
L-4 BCE Generations of Computers final.ppt
L-4 BCE Generations of Computers final.pptL-4 BCE Generations of Computers final.ppt
L-4 BCE Generations of Computers final.ppt
 
L-1 BCE computer fundamentals final kirti.ppt
L-1 BCE computer fundamentals final kirti.pptL-1 BCE computer fundamentals final kirti.ppt
L-1 BCE computer fundamentals final kirti.ppt
 
BCE L-4 Data Type In C++.ppt
BCE L-4 Data Type In C++.pptBCE L-4 Data Type In C++.ppt
BCE L-4 Data Type In C++.ppt
 
BCE L-3 overview of C++.ppt
BCE L-3 overview of C++.pptBCE L-3 overview of C++.ppt
BCE L-3 overview of C++.ppt
 
BCE L-2 Algorithms-and-Flowchart-ppt.ppt
BCE L-2 Algorithms-and-Flowchart-ppt.pptBCE L-2 Algorithms-and-Flowchart-ppt.ppt
BCE L-2 Algorithms-and-Flowchart-ppt.ppt
 
BCE L-1 Programmimg languages.pptx
BCE L-1  Programmimg languages.pptxBCE L-1  Programmimg languages.pptx
BCE L-1 Programmimg languages.pptx
 
BCE L-1 networking fundamentals 111.pptx
BCE L-1  networking fundamentals 111.pptxBCE L-1  networking fundamentals 111.pptx
BCE L-1 networking fundamentals 111.pptx
 
BCE L-2 e commerce.pptx
BCE L-2 e commerce.pptxBCE L-2 e commerce.pptx
BCE L-2 e commerce.pptx
 
L 5 Numpy final ppt kirti.pptx
L 5 Numpy final ppt kirti.pptxL 5 Numpy final ppt kirti.pptx
L 5 Numpy final ppt kirti.pptx
 
L 2 Introduction to Data science final kirti.pptx
L 2 Introduction to Data science final kirti.pptxL 2 Introduction to Data science final kirti.pptx
L 2 Introduction to Data science final kirti.pptx
 
Pandas Dataframe reading data Kirti final.pptx
Pandas Dataframe reading data  Kirti final.pptxPandas Dataframe reading data  Kirti final.pptx
Pandas Dataframe reading data Kirti final.pptx
 
L 8 introduction to machine learning final kirti.pptx
L 8 introduction to machine learning final kirti.pptxL 8 introduction to machine learning final kirti.pptx
L 8 introduction to machine learning final kirti.pptx
 
L 6.1 complete scikit libraray.pptx
L 6.1 complete scikit libraray.pptxL 6.1 complete scikit libraray.pptx
L 6.1 complete scikit libraray.pptx
 
L 7Complete Machine learning.pptx
L 7Complete Machine learning.pptxL 7Complete Machine learning.pptx
L 7Complete Machine learning.pptx
 
Introduction to python history and platforms
Introduction to python history and platformsIntroduction to python history and platforms
Introduction to python history and platforms
 
Informed Search Techniques new kirti L 8.pptx
Informed Search Techniques new kirti L 8.pptxInformed Search Techniques new kirti L 8.pptx
Informed Search Techniques new kirti L 8.pptx
 
Production System l 10.pptx
Production System l 10.pptxProduction System l 10.pptx
Production System l 10.pptx
 
Breath first Search and Depth first search
Breath first Search and Depth first searchBreath first Search and Depth first search
Breath first Search and Depth first search
 

Recently uploaded

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

BCE L-3omputer security Basics.pptx

  • 2. Computer Security Computer Security is the protection of computing systems and the data that they store or access. • Computer security, also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information.
  • 3. Different Elements in Computer Security (CIA)
  • 4. Different Elements in Computer Security Confidentiality • Confidentiality is the concealment of information or resources. Integrity • Integrity is the trustworthiness of data in the systems or resources by the point of view of preventing unauthorized and improper changes. Availability Availability refers to the ability to access data of a resource when it is needed, as such the information has value only if the authorize ie can access at right time.
  • 5. Different terminology used in Computer Security  Unauthorized access — An unauthorized access is when someone gains access to a server, website, or other sensitive data using someone else's account details.  Hacker — Is a Person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.  Threat — Is an action or event that might compromise the security.  Vulnerability — It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding security system.  Attack — is an as sault on the system security that is made by a person or a machine to a system.
  • 6. Different terminology used in Computer Security  Antivirus or Antimalware — Is a software that operates on different OS which is used to prevent from malicious software.  Social Engineering— Is a technique that a hacker uses to steal data from a person for different purposes by psychological manipulation combined with social scenes.  Virus — Itis a malicious software that installs on your computer without your consent for a bad purpose. They can damage or delete files, Slow down your computer and Invade your emails.
  • 7.
  • 8. Virus  A computer virus is a type malware that, when executed, replicates itself by modifying other computer programs and inserting its own code.  A computer virus is written to alter the way a computer operates and that is designed to spread from one computer to another.
  • 9.
  • 10. Virus How do computer viruses spread?  Email and text message attachments  Internet file downloads  Social media links  Mobile devices and smart phones can become infected with mobile viruses through shady App downloads.  As attach ments of socially shareable content such as funny images, greeting cards, or audio and video files.  Inserting or connecting an infected disk, disc, or drive  un known links
  • 11. Virus Possible effects of virus attack on a computer  Delete data  Overwrite information  Display messages  Add itself to other files on the computer  Stealing passwords or data  Logging keystrokes  Corrupting files  spamming email contacts  even taking over the machine
  • 12. Hacking • Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. • A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
  • 13. Ethical Hacking Identifying weakness in computer systems and/or computer networks and coming with counter measures that protect the weaknesses. Ethical hackers must abide by the following rules. • Get written permission from the owner of the computer system and/or computer network before hacking. • Protect the privacy of the organization been hacked. • Transparently report all the identified weaknesses in the computer system to the organization.
  • 14. Cyber crime • Cyber crime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers, etc. • Most cybercrimes are committed through the internet. • Some cybercrimes can also be carried out using Mobile phones via SMS and online chatting applications.
  • 15. Types of Cybercrime Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on social media, websites, etc. Identity Thefi: Stealing personal information from somebody and impersonating that person. Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc. Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers. ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts. Spamming: unauthorized emails. These emails usually contain advertisement. Cyber crime
  • 16. Anti—virus Anti—virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses. There are several different companies that build and offer anti—virus software and what each offers can vary but all perform some basic functions: • Scan specific files or directories for any malware or known malicious patterns. • Allow you to schedule scans to automatically run for you. • Allow you to initiate a scan of a specific file or of your computer, or of • a CD or flash drive at any time. • Remove any malicious code detected —sometimes you will be notified of an infection and asked if you want to clean the file, other programs will automatically do this behind the scenes. • Show you the ‘health' of your computer
  • 17. Spyware • Spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer's consent. • "Spyware" is mostly classified into four types:  Adware.,  System monitors,  Tracking cookies, and  Trojans; • Spyware that is installed for innocuous reasons is sometimes referred to as tracking software.
  • 18.
  • 19. Spyware • Spyware can collect almost any type of data, including personal information like internet searching habits, user logins, and bank or credit account information. • Spyware can also interfere with a user's control of a computer by installing additional software or redirecting users. • Some spyware can change computer settings, which can result in slow Internet connection speeds, un—authorized changes in browser settings, or changes to software settings.
  • 20. How to recognize Spyware • New and/or unidentifiable icons may appear in the task bar at the bottom of your screen. • Searches may result in you being redirected to a different search engine. • Random error messages appear when you perform operations that previously worked fine. • But the best way to identify if you have been infected is to use a spyware scan ner, which will be included in any spyware removal software.
  • 21.
  • 22.
  • 23.
  • 24. Firewall • In column, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. • A firewall acts as a barrier between a trusted network and non—trusted network. • This means that the only traffic allowed onto the network is defined in the firewall policy; all other traffic is denied.
  • 25. Measures to keep your system and data safe • Computer Application White listening — install just a restricted number of applications in your computers, which are useful as well as are genuine. • Computer System Restore Solution — If computer is hacked and your files are damaged, you should have the possibility to again have access to your files. An example is Windows System Restore or Backup. • Computer and Network Authentication — The data that is accessed over the network is best to be provided only to the authorized users. Usernames and passwords!!! • Update Your Software. Keep your software including your operating system, the web browsers you use to connect to the Internet, and your apps up to date to protect against the latest threats.
  • 26.  Protect Your Personal Information. Don't hand it out to just anyone.  Your Social Security number, credit card numbers, and bank and utility account numbers can be used to steal your money or open new accounts in your name.  So every time you are asked for your personal information — whether in a web form, an email, a text, or a phone message think about why someone needs it and whether you can really trust the request. Measures to keep your system and data safe
  • 27. KEEP IN MIND • Use strong password • Use authorized Websites • Keep your Computer Screen locked • Take timely back-ups • Think twice before posting on Social Media.