IT security, hackers,IT security and risks and safe guards, password, how to create password, bio-metric authentication , virus , antivirus software ,how to safe a devices from virus.types of viruses
You've seen the headlines. You're beginning to understand the importance of cybersecurity. Where do you begin? It's important to understand the common methods of attack and ways you can begin to protect your organization today. For more information on our cybersecurity education please visit FPOV.com/edu.
You've seen the headlines. You're beginning to understand the importance of cybersecurity. Where do you begin? It's important to understand the common methods of attack and ways you can begin to protect your organization today. For more information on our cybersecurity education please visit FPOV.com/edu.
A single email can cause a multi-million dollar breach if opened by an end-user with no security awareness, they may not even be aware of their mistake. The problem lies in the fact that only a few end-users are aware of the dangers of social engineering, much less how to detect it. It is a major issue in the business world today.
This document seeks to address the most common threats that can be posed to an entity and also recommend security measures that can be implemented to avoid such attacks.
Learn more at https://www.multinationalnetworks.com
What is Information Security?
Information security means that the confidentiality, integrity and availability of information assets is maintained.
Confidentiality: This means that information is only used by people who are authorized to access it.
Integrity: It ensures that information remains intact and unaltered. Any changes to the information through malicious action, natural disaster, or even a simple innocent mistake are tracked.
Availability: This means that the information is accessible when authorized users need it.
Information Security Threats:
Most common types of information security threats are:
Theft of confidential information by hacking
System sabotage by hackers
Phishing and other social engineering attacks
Virus, spyware and malware
Social Media-the fraud threat
Theft of Confidential Information:
One of the major threat to information security is the theft of confidential data by hacking. This includes theft of employee information or theft of trade secrets and other intellectual property (IP).
Theft of Employee Information
Employee information includes credit card information, corporate credit card information, social security number , address, etc. It also includes theft of healthcare records as they contain personal information such date of birth, address, and name of relatives.
Theft of Trade Secrets and other Intellectual Property (IP)
Technology from various verticals including IT, aerospace, and telecommunications are constantly stolen by outsiders or insiders (industrial espionage). China is a growing offender as it continues to advance in technology relying on theft of international trade secrets and IP.
Piracy/copyright infringement.
Corporate business strategies including marketing strategies, product introduction strategies.
System Sabotage:
What is system sabotage?
Planting malware on networks of target organization and generating an enormous amount of transaction activity resulting in malfunction or crash of the system.
Who would perpetrate it?
System sabotage is usually committed by disgruntled ex-employees and by remote cyber-attackers for no particular reason.
The most sensational case of system sabotage: One of the recent examples is the sabotage of Sony PlayStation.
Phishing:
To obtain confidential data about individuals-customers, clients, employees or vendors that can be used to commit various types of identity fraud such as:
Opening bank accounts in victim’s name
Applying for loans in victim’s name
Applying for credit cards in victim’s name
Obtaining medical services in victims name (e-death)
Other kind of more sophisticated social engineering attacks include spear-phishing.
Spear-phishing targets specific individuals such as AP manger, controller, senior accountant to gain access to corporate bank accounts and transfer funds abroad.
Other threats include:
Smishing: Phishing via SMS (texting)
Vishing: Phishing via voice (phone)
Mobile hackin
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
It includes communication security, network security and information security.
The main problem increasing day by day is cyber crime. Crime committed using a computer and the internet to steal data or information is known as cyber crime. It is one of the disadvantages of internet. It is totally an illegal activity.
Cyber security is becoming increasingly relevant within the insurance industry to the degree, that the National Association of Insurance Commissioners (NAIC) named it as the key initiative for 2015.
Infections cost organizations billions of dollars in lost time and productivity, as well as ransom payments and other indirect costs, like damage to a business’s reputation.
End-users will learn about password management, multi-factor authentication and how to secure their laptops and desktops while working remotely.
This session will teach professionals how to avoid becoming a statistic.
Agenda: Foundations of security awareness | Common threats | Three ways to secure your work environment | Best practices for users | The work from home checklist
After massive hit of ransomware WannaCry. Check the basics of ransomware, protection and prevention tips. Find out history of ransomeware, spreading method, prevention tips in detail.
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsApurv Singh Gautam
What's the hype with the dark web? Why are security researchers focusing more on the dark web? How to perform threat hunting on the dark web? Can it be automated? If you are curious about the answers to these questions, then this talk is for you. Dark web hosts several sites where criminals buy, sell, and trade goods and services like drugs, weapons, exploits, etc. Hunting on the dark web can help identify, profile, and mitigate any organization risks if done timely and appropriately. This is why threat intelligence obtained from the dark web can be crucial for any organization. In this presentation, you will learn why threat hunting on the dark web is necessary, different methodologies to perform hunting, the process after hunting, and how hunted data is analyzed. The main focus of this talk will be automating the threat hunting on the dark web. You will also get to know what operational security (OpSec) is and why it is essential while performing hunting on the dark web and how you can employ it in your daily life.
A single email can cause a multi-million dollar breach if opened by an end-user with no security awareness, they may not even be aware of their mistake. The problem lies in the fact that only a few end-users are aware of the dangers of social engineering, much less how to detect it. It is a major issue in the business world today.
This document seeks to address the most common threats that can be posed to an entity and also recommend security measures that can be implemented to avoid such attacks.
Learn more at https://www.multinationalnetworks.com
What is Information Security?
Information security means that the confidentiality, integrity and availability of information assets is maintained.
Confidentiality: This means that information is only used by people who are authorized to access it.
Integrity: It ensures that information remains intact and unaltered. Any changes to the information through malicious action, natural disaster, or even a simple innocent mistake are tracked.
Availability: This means that the information is accessible when authorized users need it.
Information Security Threats:
Most common types of information security threats are:
Theft of confidential information by hacking
System sabotage by hackers
Phishing and other social engineering attacks
Virus, spyware and malware
Social Media-the fraud threat
Theft of Confidential Information:
One of the major threat to information security is the theft of confidential data by hacking. This includes theft of employee information or theft of trade secrets and other intellectual property (IP).
Theft of Employee Information
Employee information includes credit card information, corporate credit card information, social security number , address, etc. It also includes theft of healthcare records as they contain personal information such date of birth, address, and name of relatives.
Theft of Trade Secrets and other Intellectual Property (IP)
Technology from various verticals including IT, aerospace, and telecommunications are constantly stolen by outsiders or insiders (industrial espionage). China is a growing offender as it continues to advance in technology relying on theft of international trade secrets and IP.
Piracy/copyright infringement.
Corporate business strategies including marketing strategies, product introduction strategies.
System Sabotage:
What is system sabotage?
Planting malware on networks of target organization and generating an enormous amount of transaction activity resulting in malfunction or crash of the system.
Who would perpetrate it?
System sabotage is usually committed by disgruntled ex-employees and by remote cyber-attackers for no particular reason.
The most sensational case of system sabotage: One of the recent examples is the sabotage of Sony PlayStation.
Phishing:
To obtain confidential data about individuals-customers, clients, employees or vendors that can be used to commit various types of identity fraud such as:
Opening bank accounts in victim’s name
Applying for loans in victim’s name
Applying for credit cards in victim’s name
Obtaining medical services in victims name (e-death)
Other kind of more sophisticated social engineering attacks include spear-phishing.
Spear-phishing targets specific individuals such as AP manger, controller, senior accountant to gain access to corporate bank accounts and transfer funds abroad.
Other threats include:
Smishing: Phishing via SMS (texting)
Vishing: Phishing via voice (phone)
Mobile hackin
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
It includes communication security, network security and information security.
The main problem increasing day by day is cyber crime. Crime committed using a computer and the internet to steal data or information is known as cyber crime. It is one of the disadvantages of internet. It is totally an illegal activity.
Cyber security is becoming increasingly relevant within the insurance industry to the degree, that the National Association of Insurance Commissioners (NAIC) named it as the key initiative for 2015.
Infections cost organizations billions of dollars in lost time and productivity, as well as ransom payments and other indirect costs, like damage to a business’s reputation.
End-users will learn about password management, multi-factor authentication and how to secure their laptops and desktops while working remotely.
This session will teach professionals how to avoid becoming a statistic.
Agenda: Foundations of security awareness | Common threats | Three ways to secure your work environment | Best practices for users | The work from home checklist
After massive hit of ransomware WannaCry. Check the basics of ransomware, protection and prevention tips. Find out history of ransomeware, spreading method, prevention tips in detail.
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsApurv Singh Gautam
What's the hype with the dark web? Why are security researchers focusing more on the dark web? How to perform threat hunting on the dark web? Can it be automated? If you are curious about the answers to these questions, then this talk is for you. Dark web hosts several sites where criminals buy, sell, and trade goods and services like drugs, weapons, exploits, etc. Hunting on the dark web can help identify, profile, and mitigate any organization risks if done timely and appropriately. This is why threat intelligence obtained from the dark web can be crucial for any organization. In this presentation, you will learn why threat hunting on the dark web is necessary, different methodologies to perform hunting, the process after hunting, and how hunted data is analyzed. The main focus of this talk will be automating the threat hunting on the dark web. You will also get to know what operational security (OpSec) is and why it is essential while performing hunting on the dark web and how you can employ it in your daily life.
Mitisol is the perfect solution for Cyber security and risk management, Cyber security and risk management, Cyber Security Company in Dhaka, Bangladesh.
We are the best instutute for Cyber security courses, Cyber Security Course Training, Advanced Cyber security courses in Dhaka, Bangladesh. So keep visiting our websites to get update on regular basis.
Courtney Pachucki, IT Specialist at MePush, wrote this amazing Internet hygiene presentation for users on the Web to stay safe and avoid being hacked, phished, or infected with malware. This is a basic set of guidelines to help you identify your risks on the web.
A Presentation On Basic Network Security And Viruses For College Level. Basics on Networking, Network Security, Virus, Spyware, Vulnerability, Hacking And Indian Laws To Prevent Hacking
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
In essence, computer security is the safeguarding of data and computer systems against loss, theft, and unauthorized access. It involves keeping an eye out for and stopping illegal use of your computer system.
A variety of computer security techniques are frequently employed to safeguard the critical data held by an organization cyber security.
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
In essence, computer security is the safeguarding of data and computer systems against loss, theft, and unauthorized access. It involves keeping an eye out for and stopping illegal use of your computer system.
A variety of computer security techniques are frequently employed to safeguard the critical data held by an organization cyber security.
Type of Security Threats and its Preventionijsrd.com
Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The term online system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The basic aim of this article is to Prevention against unauthorized security Attack and Threats.
computer programming,Low Level Language ,Machine Language
Assembly Language
High Level Language /Procedural Languages,C++ && C#,Web Page Development,XHTML (extensible HTML),JavaScript && PHP && VBScript,Dynamic HTML Dynamic HTML (DHTML)Dynamic HTML Dynamic HTML (DHTML),Algorithm,sourc code , object code
Memory Management
Swapping
Fragmentation
Types of Fragmentation
Paging
Demand Paging
Segmentation
Virtual Memory
Von Neumann Architecture
overlay
Process and Thread
Process Synchronization
Deadlock
CPU Scheduling
process scheduling
Memory Management
Swapping
Fragmentation
Types of Fragmentation
Paging
Demand Paging
Segmentation
Virtual Memory
Von Neumann Architecture
overlay
Process and Thread
Process Synchronization
Deadlock
CPU Scheduling
process scheduling
Explain the operation of the command line interface
Execute fundamental commands from the command line interface
Manipulate files and folders from the command line
How does the Command Line Work?
computer input and output devices. . keyboard , mouse , printer ,scanner, web cam , types of mouse , types of printer and scanner, difference between printer and scanner, microphone,digital camera , speaker ,projector ,moniter,projector types
computer hardware,
Internal Hardware
Processor (CPU)
Motherboard
RAM
Hard Disk Drive
Sound Card
Video Card
Network Card
Power Supply
External Hardware
Monitor or LCD
Keyboard
Mouse
Printer
Scanner
USB Drive
Internal Hardware
Processor (CPU)
Motherboard
RAM
Hard Disk Drive
Sound Card
Video Card
Network Card
Power Supply
External Hardware
Monitor or LCD
Keyboard
Mouse
Printer
Scanner
USB Drive
internet , how to connect with internet, world wide web ,different types of websites, what is E-Commerce , how many browser , internet advantage and dis advantage , social networking
basic computer,
What is Computer
Data &Information
Advantages of computer
Disadvantages of computer
Generation Of Computer
Network
Internet
Software
Categories of computer
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Ch # 10 computer security risks and safe guards
1.
2. Computer Security Risks
Today, people rely on computers to create, store,
and manage critical information. Thus, it is crucial
that users take measures to protect their computers
and data from loss, damage, and misuse. A
computer security risk is any event or action that
could cause a loss of or damage to computer
hardware, software, data, information, or
processing capability. While some breaches to
computer security are accidental, many are
intentional. Some intruders do no damage; they
merely access data, information, or programs on
3. Hacker
The term hacker, although originally a
complimentary word for a computer enthusiast, now
has a derogatory meaning and refers to someone
who accesses a computer or network illegally.
4.
5. Unethical Access
Unethical employees break into their employers’
computers for a variety of reasons. Some simply
want to exploit a security weakness. Others seek
financial gains from selling confidential information.
6. Computer Security , Risks
and SafeGuards
Computer Security: The protection of computer systems
and information from harm, theft, and unauthorized use
Risks: The thefts, harms and data loss are involved in Risks
of Computer
SafeGuards: The software's and the ways for securing and
protecting the Computer from harms
7. Computer Security
Computer security, also known as cyber security or
IT security, is the protection of:
information systems from theft or damage to the
hardware, the software, and to the information on
them,
as well as from disruption or misdirection of the
services they provide
from unauthorized use and damage and from
sabotage and natural disasters
8. Concerns of Computer Security
Confidentiality: Only authorized users can
access the data resources and information.
Integrity: Only authorized users should be
able to modify the data when needed.
Availability: Data should be available to users
when needed.
Authentication: are you really communicating
with whom you think you are communicating
with
9. Computer Risks
It is any event or action that could cause a loss of or
damage to computer hardware, software, data
information or processing capability.
Risks involved are:
Hardware Thefts
Software Thefts
Theft of online Movie and Music
THEFT OF TIME & SERVICES
Internet and Networks Attack
System Failure
10. Hardware Theft
Hardware theft is the unauthorized taking of
computer hardware. In some cases, corporate
or government hardware is stolen to be sold,
but in other cases, personal items are
targeted. The popularity of smartphones and
tablets has made hardware theft a common
crime in major cities
11.
12. Software Theft
Software theft means the unauthorized or
illegal copying, sharing or usage of copyright-
protected software programs. Software theft
may be carried out by individuals, groups or, in
some cases, organizations who then distribute
the unauthorized software copies to users.
13.
14. THEFT OF ONLINE MUSIC &
MOVIES
Many students may feel that illegally
downloading music and movies is a victimless
crime, but to the entertainment industry it is
just plain piracy or theft.
15. THEFT OF TIME & SERVICES
The theft of computer time is more common
than you might think. Probably the biggest
instance is people using their employer’s
computer time to play games, do online
shopping . Some people even operate
sideline businesses.
16. Internet and Networks Attack
A security breaching attempt and network attack
is defined as a threat. Most of the attacks
including intrusion, denial of service or other on
a network infrastructure analyze the entire
network in order to gain the information.
After gaining the required information, such
attacks eventually cause your network to corrupt
or crash. Different attackers may different types
of network attacks as they might not be
interested only in ‘exploiting software
applications, but also get unauthorized access of
17. virus
A computer virus is a potentially damaging
computer program that affects, or infects, a
computer negatively by altering the way the
computer works without the user’s knowledge or
permission. Once the virus infects the computer, it
can spread throughout and may damage files and
system software, including the operating system.
19. worm
A worm is a program that copies itself repeatedly,
for example in memory or on a network, using up
resources and possibly shutting down the
computer or network.
20. Trojan horse
A Trojan horse is a program that hides within or
looks like a legitimate program. A certain condition or
action usually triggers the Trojan horse. Unlike a
virus or worm, a Trojan horse does not replicate itself
to other computers.
21. Rootkit
A rootkit is a program that hides in a computer and
allows someone from a remote location to take full
control of the computer. Once the rootkit is installed,
the rootkit author can execute programs, change
settings, monitor activity, and access files on the
remote computer.
22. System Failure
A system failure can occur because of a
hardware failure or a several software issue,
causing the system to freeze, reboot, or stop
functioning altogether. A system failure may or
may not result in an error being displayed on
the screen. The computer may shut off without
warning and without any error message.
If an error message is displayed, it often is
displayed as a Blue Screen of Death error.
23. In computer security a threat is a possible
danger that might exploit a vulnerability to
breach security and thus cause possible harm.
A threat can be either “intentional” (i.e.
intelligent) or “ accidently”(the possibility of a
computer malfunctioning).
25. The software's and other programs which are used
to safe the computer from risks are included in
Safeguards and protection of Computer
Safe Guards include:
Fire Walls Proxy Server
Encryption
Anti Viruses
BIOMETRIC AUTHENTICATION
Secure Passwords
Computer Safeguards
26. Fire Walls
Firewall is a network device that isolates
organization’s internal network from larger
outside network/Internet. It can be a hardware,
software, or combined system that prevents
unauthorized access to or from internal
network.
All data packets entering or leaving the
internal network pass through the firewall,
which examines each packet and blocks those
that do not meet the specified security criteria.
28. Anti Viruses
All antivirus engines have three components to
function accordingly. It is important to have a
look at these functions because it will help us
for better manual cleaning of viruses in case
we need.
Scanning − When a new virus is detected in
the cyberspace, antivirus producers start
writing programs (updates) that scans for
similar signature strings.
29. Anti Viruses
Integrity Checking − This method generally
checks for manipulated files in OS from the
viruses.
Interception − This method is used basically
to detect Trojans and it checks the request
made by the operating system for network
access.
31. Online Virus Testing
If the system administrator does not have an
antivirus installed or suspects a file that is
infected. They would recommend to use the
online testing antivirus engine which
(according to me) is one of the best
https://www.virustotal.com
32. Free Antivirus Software
Avast Antivirus
AVG Antivirus
Panda Antivirus 2019
Microsoft Security Essentials
34. Encryption
Encryption is a security method in which
information is encoded in such a way that only
authorized user can read it. It uses encryption
algorithm to generate cipher text that can only
be read if decrypted.
List of Encryption Method
Advanced Encryption Standard, AES
Triple Data Encryption Standard and etc
36. Rules in Creating Passwords
Rule 1: Don’t tell anyone your user name and
password: Of course you shouldn’t tell strangers.
You also shouldn’t even tell friends or relatives.
• Rule 2: Don’t use passwords that can be easily
guessed: Don’t use “12345,” the word “password,”
variations on your name, your nickname, your
street address, mother’s maiden name, pet’s
name, college name, or name of your favorite
sports team.
37. Rules in Creating Passwords
Rule 3: Avoid any word that appears in a
dictionary: Instead, use weird combinations of
letters, numbers, and punctuation. Mix
uppercase and lowercase, along with special
characters such as !, #, and %.
Rule 4: Create long passwords, especially for
sensitive sites: For financial accounts, for
instance, 15-character passwords are
recommended (which are 33,000 times harder
to crack than an 8-character one).55
38. Rules in Creating Passwords
Rule 5: Don’t use the same password for multiple
sites: Avoid reusing the same password at different
sites, since if hackers or scammers obtain one
account, they potentially have your entire online
life. If you do use the same password for multiple
purposes, use it only for low-risk sites, such as
newspaper registrations.
Rule 6: Change passwords often: Change
passwords often, such as every 4 or 6 weeks or on
a set schedule such as the first day of spring,
summer, and so on. Change passwords when you
39. BIOMETRIC
AUTHENTICATION
A hacker can easily breach a computer
system with a guessed or stolen password.
But some forms of identification can’t be easily
faked—such as your physical traits.
Biometrics, the science of measuring
individual body characteristics, tries to use
these in security devices. Biometric
authentication devices authenticate a person’s
identity by comparing his or her physical or
behavioral characteristics with digital code
stored in a computer system.
40. BIOMETRIC
AUTHENTICATION
There are several kinds of devices for verifying
physical or behavioral characteristics that can
be used to authenticate a person’s identity
Hand-geometry systems: Also known as full-
hand palm scanners, these are devices to
verify a person’s identity by scanning the entire
hand, which, for each person, is as unique as
a fingerprint and changes little over time.
41. BIOMETRIC
AUTHENTICATION
Fingerprint scanners: These range from optical
readers, in which you place a finger over a window,
to swipe readers, such as those built into laptops
and some handhelds, which allow you to run your
finger across a bar like sensor. Microsoft offers
optical fingerprint readers to go with Windows
XP/Vista.
• Iris-recognition systems: Because no two
people’s eyes are alike, iris scans are very reliable
identifiers. In Europe, some airports are using iris-
scanning systems as a way of speeding up
42. BIOMETRIC
AUTHENTICATION
Face-recognition systems: Facial-recognition
systems may come to play an important role in
biometric photos embedded in U.S. passports and
those of other industrialized nations during the next
few years. The technology, which compares a live
face image with a digitized image stored in a
computer, is even used now as a security system for
some notebook computers. 53
• Voice-recognition systems: These systems
compare a person’s voice with digitized voice prints
stored in a computer, which the individual has
43. Conclusion
For the betterment of the computer usage we
have to secure our data and information.
For this purpose we should take care of the risks
involved while using computer programs and
installed computer security and safeguards to
overcome risks.