SlideShare a Scribd company logo
Computer Security Risks
 Today, people rely on computers to create, store,
and manage critical information. Thus, it is crucial
that users take measures to protect their computers
and data from loss, damage, and misuse. A
computer security risk is any event or action that
could cause a loss of or damage to computer
hardware, software, data, information, or
processing capability. While some breaches to
computer security are accidental, many are
intentional. Some intruders do no damage; they
merely access data, information, or programs on
Hacker
 The term hacker, although originally a
complimentary word for a computer enthusiast, now
has a derogatory meaning and refers to someone
who accesses a computer or network illegally.
Unethical Access
 Unethical employees break into their employers’
computers for a variety of reasons. Some simply
want to exploit a security weakness. Others seek
financial gains from selling confidential information.
Computer Security , Risks
and SafeGuards
 Computer Security: The protection of computer systems
and information from harm, theft, and unauthorized use
 Risks: The thefts, harms and data loss are involved in Risks
of Computer
 SafeGuards: The software's and the ways for securing and
protecting the Computer from harms
Computer Security
 Computer security, also known as cyber security or
IT security, is the protection of:
 information systems from theft or damage to the
hardware, the software, and to the information on
them,
 as well as from disruption or misdirection of the
services they provide
 from unauthorized use and damage and from
sabotage and natural disasters
Concerns of Computer Security
 Confidentiality: Only authorized users can
access the data resources and information.
 Integrity: Only authorized users should be
able to modify the data when needed.
 Availability: Data should be available to users
when needed.
 Authentication: are you really communicating
with whom you think you are communicating
with
Computer Risks
 It is any event or action that could cause a loss of or
damage to computer hardware, software, data
information or processing capability.
Risks involved are:
 Hardware Thefts
 Software Thefts
 Theft of online Movie and Music
 THEFT OF TIME & SERVICES
 Internet and Networks Attack
 System Failure
Hardware Theft
 Hardware theft is the unauthorized taking of
computer hardware. In some cases, corporate
or government hardware is stolen to be sold,
but in other cases, personal items are
targeted. The popularity of smartphones and
tablets has made hardware theft a common
crime in major cities
Software Theft
 Software theft means the unauthorized or
illegal copying, sharing or usage of copyright-
protected software programs. Software theft
may be carried out by individuals, groups or, in
some cases, organizations who then distribute
the unauthorized software copies to users.
THEFT OF ONLINE MUSIC &
MOVIES
 Many students may feel that illegally
downloading music and movies is a victimless
crime, but to the entertainment industry it is
just plain piracy or theft.
THEFT OF TIME & SERVICES
 The theft of computer time is more common
than you might think. Probably the biggest
instance is people using their employer’s
computer time to play games, do online
shopping . Some people even operate
sideline businesses.
Internet and Networks Attack
 A security breaching attempt and network attack
is defined as a threat. Most of the attacks
including intrusion, denial of service or other on
a network infrastructure analyze the entire
network in order to gain the information.
 After gaining the required information, such
attacks eventually cause your network to corrupt
or crash. Different attackers may different types
of network attacks as they might not be
interested only in ‘exploiting software
applications, but also get unauthorized access of
virus
 A computer virus is a potentially damaging
computer program that affects, or infects, a
computer negatively by altering the way the
computer works without the user’s knowledge or
permission. Once the virus infects the computer, it
can spread throughout and may damage files and
system software, including the operating system.
Virus
worm
 A worm is a program that copies itself repeatedly,
for example in memory or on a network, using up
resources and possibly shutting down the
computer or network.
Trojan horse
 A Trojan horse is a program that hides within or
looks like a legitimate program. A certain condition or
action usually triggers the Trojan horse. Unlike a
virus or worm, a Trojan horse does not replicate itself
to other computers.
Rootkit
 A rootkit is a program that hides in a computer and
allows someone from a remote location to take full
control of the computer. Once the rootkit is installed,
the rootkit author can execute programs, change
settings, monitor activity, and access files on the
remote computer.
System Failure
 A system failure can occur because of a
hardware failure or a several software issue,
causing the system to freeze, reboot, or stop
functioning altogether. A system failure may or
may not result in an error being displayed on
the screen. The computer may shut off without
warning and without any error message.
 If an error message is displayed, it often is
displayed as a Blue Screen of Death error.
 In computer security a threat is a possible
danger that might exploit a vulnerability to
breach security and thus cause possible harm.
 A threat can be either “intentional” (i.e.
intelligent) or “ accidently”(the possibility of a
computer malfunctioning).
Computer Safeguards
 The software's and other programs which are used
to safe the computer from risks are included in
Safeguards and protection of Computer
Safe Guards include:
 Fire Walls Proxy Server
 Encryption
 Anti Viruses
 BIOMETRIC AUTHENTICATION
 Secure Passwords
Computer Safeguards
Fire Walls
 Firewall is a network device that isolates
organization’s internal network from larger
outside network/Internet. It can be a hardware,
software, or combined system that prevents
unauthorized access to or from internal
network.
 All data packets entering or leaving the
internal network pass through the firewall,
which examines each packet and blocks those
that do not meet the specified security criteria.
Fire Walls
Anti Viruses
 All antivirus engines have three components to
function accordingly. It is important to have a
look at these functions because it will help us
for better manual cleaning of viruses in case
we need.
 Scanning − When a new virus is detected in
the cyberspace, antivirus producers start
writing programs (updates) that scans for
similar signature strings.
Anti Viruses
 Integrity Checking − This method generally
checks for manipulated files in OS from the
viruses.
 Interception − This method is used basically
to detect Trojans and it checks the request
made by the operating system for network
access.
Anti Viruses
Online Virus Testing
 If the system administrator does not have an
antivirus installed or suspects a file that is
infected. They would recommend to use the
online testing antivirus engine which
(according to me) is one of the best
 https://www.virustotal.com
Free Antivirus Software
 Avast Antivirus
 AVG Antivirus
 Panda Antivirus 2019
 Microsoft Security Essentials
Free Antivirus Software
Encryption
 Encryption is a security method in which
information is encoded in such a way that only
authorized user can read it. It uses encryption
algorithm to generate cipher text that can only
be read if decrypted.
 List of Encryption Method
 Advanced Encryption Standard, AES
 Triple Data Encryption Standard and etc
Password
Rules in Creating Passwords
 Rule 1: Don’t tell anyone your user name and
password: Of course you shouldn’t tell strangers.
You also shouldn’t even tell friends or relatives.
 • Rule 2: Don’t use passwords that can be easily
guessed: Don’t use “12345,” the word “password,”
variations on your name, your nickname, your
street address, mother’s maiden name, pet’s
name, college name, or name of your favorite
sports team.
Rules in Creating Passwords
 Rule 3: Avoid any word that appears in a
dictionary: Instead, use weird combinations of
letters, numbers, and punctuation. Mix
uppercase and lowercase, along with special
characters such as !, #, and %.
 Rule 4: Create long passwords, especially for
sensitive sites: For financial accounts, for
instance, 15-character passwords are
recommended (which are 33,000 times harder
to crack than an 8-character one).55
Rules in Creating Passwords
 Rule 5: Don’t use the same password for multiple
sites: Avoid reusing the same password at different
sites, since if hackers or scammers obtain one
account, they potentially have your entire online
life. If you do use the same password for multiple
purposes, use it only for low-risk sites, such as
newspaper registrations.
 Rule 6: Change passwords often: Change
passwords often, such as every 4 or 6 weeks or on
a set schedule such as the first day of spring,
summer, and so on. Change passwords when you
BIOMETRIC
AUTHENTICATION
 A hacker can easily breach a computer
system with a guessed or stolen password.
But some forms of identification can’t be easily
faked—such as your physical traits.
Biometrics, the science of measuring
individual body characteristics, tries to use
these in security devices. Biometric
authentication devices authenticate a person’s
identity by comparing his or her physical or
behavioral characteristics with digital code
stored in a computer system.
BIOMETRIC
AUTHENTICATION
 There are several kinds of devices for verifying
physical or behavioral characteristics that can
be used to authenticate a person’s identity
 Hand-geometry systems: Also known as full-
hand palm scanners, these are devices to
verify a person’s identity by scanning the entire
hand, which, for each person, is as unique as
a fingerprint and changes little over time.
BIOMETRIC
AUTHENTICATION
 Fingerprint scanners: These range from optical
readers, in which you place a finger over a window,
to swipe readers, such as those built into laptops
and some handhelds, which allow you to run your
finger across a bar like sensor. Microsoft offers
optical fingerprint readers to go with Windows
XP/Vista.
 • Iris-recognition systems: Because no two
people’s eyes are alike, iris scans are very reliable
identifiers. In Europe, some airports are using iris-
scanning systems as a way of speeding up
BIOMETRIC
AUTHENTICATION
 Face-recognition systems: Facial-recognition
systems may come to play an important role in
biometric photos embedded in U.S. passports and
those of other industrialized nations during the next
few years. The technology, which compares a live
face image with a digitized image stored in a
computer, is even used now as a security system for
some notebook computers. 53
 • Voice-recognition systems: These systems
compare a person’s voice with digitized voice prints
stored in a computer, which the individual has
Conclusion
 For the betterment of the computer usage we
have to secure our data and information.
 For this purpose we should take care of the risks
involved while using computer programs and
installed computer security and safeguards to
overcome risks.

More Related Content

What's hot

End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Information security threats
Information security threatsInformation security threats
Information security threats
complianceonline123
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Geevarghese Titus
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Information security
Information security Information security
Information security
AishaIshaq4
 
Cyber security
Cyber securityCyber security
Cyber security
Sapna Patil
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
Strategic Insurance Software
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Data Security
Data SecurityData Security
Data Security
AkNirojan
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
SHAAMILIVARSAGV
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Krutarth Vasavada
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Ransomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCrypt
Yash Diwakar
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
Anuradha Moti T
 
Phishing
PhishingPhishing
Phishing
anjalika sinha
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
Automating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsAutomating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty things
Apurv Singh Gautam
 

What's hot (20)

End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Information security
Information security Information security
Information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Data Security
Data SecurityData Security
Data Security
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Ransomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCrypt
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Phishing
PhishingPhishing
Phishing
 
Security threats
Security threatsSecurity threats
Security threats
 
Automating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsAutomating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty things
 

Similar to Ch # 10 computer security risks and safe guards

Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
srtwgwfwwgw
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
ArindamGhosal6
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
computer security
computer securitycomputer security
computer security
Azhar Akhtar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
Tabsheer Hasan
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
Aamlan Saswat Mishra
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
ryrsyd
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
ijsrd.com
 
Internet security
Internet securityInternet security
Internet securityat1211
 

Similar to Ch # 10 computer security risks and safe guards (20)

Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Computer security
Computer securityComputer security
Computer security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
computer security
computer securitycomputer security
computer security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Internet security
Internet securityInternet security
Internet security
 

More from MuhammadRobeel3

Programming languages
Programming languagesProgramming languages
Programming languages
MuhammadRobeel3
 
Osi model
Osi modelOsi model
Osi model
MuhammadRobeel3
 
Memory management
Memory managementMemory management
Memory management
MuhammadRobeel3
 
Command line interface
Command line interfaceCommand line interface
Command line interface
MuhammadRobeel3
 
Ch # 11
Ch # 11Ch # 11
Ch # 09 database management system
Ch # 09 database management systemCh # 09 database management system
Ch # 09 database management system
MuhammadRobeel3
 
Ch # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocolCh # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocol
MuhammadRobeel3
 
Ch # 07 operating system
Ch # 07 operating systemCh # 07 operating system
Ch # 07 operating system
MuhammadRobeel3
 
Ch # 06 storage devices
Ch # 06 storage devicesCh # 06 storage devices
Ch # 06 storage devices
MuhammadRobeel3
 
Ch # 05 input and output devices in computer
Ch # 05 input and output devices in computerCh # 05 input and output devices in computer
Ch # 05 input and output devices in computer
MuhammadRobeel3
 
Ch # 04 computer hardware
Ch # 04 computer hardware Ch # 04 computer hardware
Ch # 04 computer hardware
MuhammadRobeel3
 
Ch # 03 software
Ch # 03  softwareCh # 03  software
Ch # 03 software
MuhammadRobeel3
 
Ch # 02 internet
Ch # 02 internetCh # 02 internet
Ch # 02 internet
MuhammadRobeel3
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
MuhammadRobeel3
 
pdlc
pdlc pdlc
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
MuhammadRobeel3
 
SDLC
SDLCSDLC

More from MuhammadRobeel3 (17)

Programming languages
Programming languagesProgramming languages
Programming languages
 
Osi model
Osi modelOsi model
Osi model
 
Memory management
Memory managementMemory management
Memory management
 
Command line interface
Command line interfaceCommand line interface
Command line interface
 
Ch # 11
Ch # 11Ch # 11
Ch # 11
 
Ch # 09 database management system
Ch # 09 database management systemCh # 09 database management system
Ch # 09 database management system
 
Ch # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocolCh # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocol
 
Ch # 07 operating system
Ch # 07 operating systemCh # 07 operating system
Ch # 07 operating system
 
Ch # 06 storage devices
Ch # 06 storage devicesCh # 06 storage devices
Ch # 06 storage devices
 
Ch # 05 input and output devices in computer
Ch # 05 input and output devices in computerCh # 05 input and output devices in computer
Ch # 05 input and output devices in computer
 
Ch # 04 computer hardware
Ch # 04 computer hardware Ch # 04 computer hardware
Ch # 04 computer hardware
 
Ch # 03 software
Ch # 03  softwareCh # 03  software
Ch # 03 software
 
Ch # 02 internet
Ch # 02 internetCh # 02 internet
Ch # 02 internet
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
pdlc
pdlc pdlc
pdlc
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
SDLC
SDLCSDLC
SDLC
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 

Ch # 10 computer security risks and safe guards

  • 1.
  • 2. Computer Security Risks  Today, people rely on computers to create, store, and manage critical information. Thus, it is crucial that users take measures to protect their computers and data from loss, damage, and misuse. A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. While some breaches to computer security are accidental, many are intentional. Some intruders do no damage; they merely access data, information, or programs on
  • 3. Hacker  The term hacker, although originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally.
  • 4.
  • 5. Unethical Access  Unethical employees break into their employers’ computers for a variety of reasons. Some simply want to exploit a security weakness. Others seek financial gains from selling confidential information.
  • 6. Computer Security , Risks and SafeGuards  Computer Security: The protection of computer systems and information from harm, theft, and unauthorized use  Risks: The thefts, harms and data loss are involved in Risks of Computer  SafeGuards: The software's and the ways for securing and protecting the Computer from harms
  • 7. Computer Security  Computer security, also known as cyber security or IT security, is the protection of:  information systems from theft or damage to the hardware, the software, and to the information on them,  as well as from disruption or misdirection of the services they provide  from unauthorized use and damage and from sabotage and natural disasters
  • 8. Concerns of Computer Security  Confidentiality: Only authorized users can access the data resources and information.  Integrity: Only authorized users should be able to modify the data when needed.  Availability: Data should be available to users when needed.  Authentication: are you really communicating with whom you think you are communicating with
  • 9. Computer Risks  It is any event or action that could cause a loss of or damage to computer hardware, software, data information or processing capability. Risks involved are:  Hardware Thefts  Software Thefts  Theft of online Movie and Music  THEFT OF TIME & SERVICES  Internet and Networks Attack  System Failure
  • 10. Hardware Theft  Hardware theft is the unauthorized taking of computer hardware. In some cases, corporate or government hardware is stolen to be sold, but in other cases, personal items are targeted. The popularity of smartphones and tablets has made hardware theft a common crime in major cities
  • 11.
  • 12. Software Theft  Software theft means the unauthorized or illegal copying, sharing or usage of copyright- protected software programs. Software theft may be carried out by individuals, groups or, in some cases, organizations who then distribute the unauthorized software copies to users.
  • 13.
  • 14. THEFT OF ONLINE MUSIC & MOVIES  Many students may feel that illegally downloading music and movies is a victimless crime, but to the entertainment industry it is just plain piracy or theft.
  • 15. THEFT OF TIME & SERVICES  The theft of computer time is more common than you might think. Probably the biggest instance is people using their employer’s computer time to play games, do online shopping . Some people even operate sideline businesses.
  • 16. Internet and Networks Attack  A security breaching attempt and network attack is defined as a threat. Most of the attacks including intrusion, denial of service or other on a network infrastructure analyze the entire network in order to gain the information.  After gaining the required information, such attacks eventually cause your network to corrupt or crash. Different attackers may different types of network attacks as they might not be interested only in ‘exploiting software applications, but also get unauthorized access of
  • 17. virus  A computer virus is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. Once the virus infects the computer, it can spread throughout and may damage files and system software, including the operating system.
  • 18. Virus
  • 19. worm  A worm is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.
  • 20. Trojan horse  A Trojan horse is a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the Trojan horse. Unlike a virus or worm, a Trojan horse does not replicate itself to other computers.
  • 21. Rootkit  A rootkit is a program that hides in a computer and allows someone from a remote location to take full control of the computer. Once the rootkit is installed, the rootkit author can execute programs, change settings, monitor activity, and access files on the remote computer.
  • 22. System Failure  A system failure can occur because of a hardware failure or a several software issue, causing the system to freeze, reboot, or stop functioning altogether. A system failure may or may not result in an error being displayed on the screen. The computer may shut off without warning and without any error message.  If an error message is displayed, it often is displayed as a Blue Screen of Death error.
  • 23.  In computer security a threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm.  A threat can be either “intentional” (i.e. intelligent) or “ accidently”(the possibility of a computer malfunctioning).
  • 25.  The software's and other programs which are used to safe the computer from risks are included in Safeguards and protection of Computer Safe Guards include:  Fire Walls Proxy Server  Encryption  Anti Viruses  BIOMETRIC AUTHENTICATION  Secure Passwords Computer Safeguards
  • 26. Fire Walls  Firewall is a network device that isolates organization’s internal network from larger outside network/Internet. It can be a hardware, software, or combined system that prevents unauthorized access to or from internal network.  All data packets entering or leaving the internal network pass through the firewall, which examines each packet and blocks those that do not meet the specified security criteria.
  • 28. Anti Viruses  All antivirus engines have three components to function accordingly. It is important to have a look at these functions because it will help us for better manual cleaning of viruses in case we need.  Scanning − When a new virus is detected in the cyberspace, antivirus producers start writing programs (updates) that scans for similar signature strings.
  • 29. Anti Viruses  Integrity Checking − This method generally checks for manipulated files in OS from the viruses.  Interception − This method is used basically to detect Trojans and it checks the request made by the operating system for network access.
  • 31. Online Virus Testing  If the system administrator does not have an antivirus installed or suspects a file that is infected. They would recommend to use the online testing antivirus engine which (according to me) is one of the best  https://www.virustotal.com
  • 32. Free Antivirus Software  Avast Antivirus  AVG Antivirus  Panda Antivirus 2019  Microsoft Security Essentials
  • 34. Encryption  Encryption is a security method in which information is encoded in such a way that only authorized user can read it. It uses encryption algorithm to generate cipher text that can only be read if decrypted.  List of Encryption Method  Advanced Encryption Standard, AES  Triple Data Encryption Standard and etc
  • 36. Rules in Creating Passwords  Rule 1: Don’t tell anyone your user name and password: Of course you shouldn’t tell strangers. You also shouldn’t even tell friends or relatives.  • Rule 2: Don’t use passwords that can be easily guessed: Don’t use “12345,” the word “password,” variations on your name, your nickname, your street address, mother’s maiden name, pet’s name, college name, or name of your favorite sports team.
  • 37. Rules in Creating Passwords  Rule 3: Avoid any word that appears in a dictionary: Instead, use weird combinations of letters, numbers, and punctuation. Mix uppercase and lowercase, along with special characters such as !, #, and %.  Rule 4: Create long passwords, especially for sensitive sites: For financial accounts, for instance, 15-character passwords are recommended (which are 33,000 times harder to crack than an 8-character one).55
  • 38. Rules in Creating Passwords  Rule 5: Don’t use the same password for multiple sites: Avoid reusing the same password at different sites, since if hackers or scammers obtain one account, they potentially have your entire online life. If you do use the same password for multiple purposes, use it only for low-risk sites, such as newspaper registrations.  Rule 6: Change passwords often: Change passwords often, such as every 4 or 6 weeks or on a set schedule such as the first day of spring, summer, and so on. Change passwords when you
  • 39. BIOMETRIC AUTHENTICATION  A hacker can easily breach a computer system with a guessed or stolen password. But some forms of identification can’t be easily faked—such as your physical traits. Biometrics, the science of measuring individual body characteristics, tries to use these in security devices. Biometric authentication devices authenticate a person’s identity by comparing his or her physical or behavioral characteristics with digital code stored in a computer system.
  • 40. BIOMETRIC AUTHENTICATION  There are several kinds of devices for verifying physical or behavioral characteristics that can be used to authenticate a person’s identity  Hand-geometry systems: Also known as full- hand palm scanners, these are devices to verify a person’s identity by scanning the entire hand, which, for each person, is as unique as a fingerprint and changes little over time.
  • 41. BIOMETRIC AUTHENTICATION  Fingerprint scanners: These range from optical readers, in which you place a finger over a window, to swipe readers, such as those built into laptops and some handhelds, which allow you to run your finger across a bar like sensor. Microsoft offers optical fingerprint readers to go with Windows XP/Vista.  • Iris-recognition systems: Because no two people’s eyes are alike, iris scans are very reliable identifiers. In Europe, some airports are using iris- scanning systems as a way of speeding up
  • 42. BIOMETRIC AUTHENTICATION  Face-recognition systems: Facial-recognition systems may come to play an important role in biometric photos embedded in U.S. passports and those of other industrialized nations during the next few years. The technology, which compares a live face image with a digitized image stored in a computer, is even used now as a security system for some notebook computers. 53  • Voice-recognition systems: These systems compare a person’s voice with digitized voice prints stored in a computer, which the individual has
  • 43. Conclusion  For the betterment of the computer usage we have to secure our data and information.  For this purpose we should take care of the risks involved while using computer programs and installed computer security and safeguards to overcome risks.