SlideShare a Scribd company logo
COMPUTER
SECURITY
11:11PM
MAKE OR BREAK YOUR TECH START UP
COMPUTER
SECURITY
Back to Agenda Page
Refers to protecting and
securing computers and their
related data, networks,
software, hardware from
unauthorized access, misuse,
theft, information loss, and
other security issues.
Securing our computers, electronic
devices, networks , programs and systems
from cyber attacks. Cyber attacks are
those attacks that happen when our
system is connected to the Internet.
4 TYPES OF COMPUTER SECURITY
Protection of the networking
infrastructure from unauthorized access,
misuse, or theft. It involves creating a
secure infrastructure for devices,
applications and users, to work in a
secure manner.
Securing applications and data so that
they don’t get hacked and databases of
the applications remain safe and
private, so that user’s data remains
confidential.
Protecting our system’s information
from theft, illegal use and piracy. It
has three objectives: confidentiality,
integrity, and availability of
information.
CYBER SECURITY INFORMATION SECURITY
APPLICATION SECURITY
NETWORK SECURITY
TYPES OF
COMPUTER
SECURITY
THREATS
Back to Agenda Page
DOS
A "Denial of Service" attack
occurs when the attackers
disrupt the services of the
particular network by sending
infinite requests and
temporary or permanently
making the network or machine
resources unavailable to the
intended audience.
BACKDOOR
In a backdoor attack, malware or
virus gets installed in our system
and starts affecting it’s security
along with the main file.
For example: Installing software
from the Internet and unknowingly,
along with this software, a malicious
file also gets installed. On execution
of the installed software, that file’s
malware starts affecting your
computer security.
EAVESDROPPING
Eavesdropping is the act of listening to a
private computer communication,
typically between hosts on a network.
Programs such as Carnivore and
NarusInSight have been used by the FBI
and NSA to eavesdrop on the systems of
ISPs. Even machines that operate as a
closed systems can be eavesdropped
upon by monitoring the faint
electromagnetic transmissions generated
by the hardware. TEMPEST is a
specification by the NSA referring to these
attacks.
PHISHING
While fishing, we catch fish by
luring them with bait. Similarly, in
phishing, a user is tricked by the
attacker or fake website who gains
the trust of the user and steals
information such as login details,
bank details, card number etc.
Phishing can be of different types
such as voice phishing, text
phishing etc.
SPOOFING
Spoofing is the act of
masquerading as a valid entity
through falsification of data (such
as an IP address or username), in
order to gain access to information
or resources that one is otherwise
unauthorized to obtain. Spoofing is
of several types- email spoofing, IP
address spoofing, MAC spoofing ,
biometric spoofing etc.
MALWARE
Malware is made up of two
terms:
Malicious + Software =
Malware.
Malware intrudes the system
and is designed to damage our
computers. Different types of
malware are adware, spyware,
ransomware, Trojan horse, etc.
SOCIAL
ENGINEERING
Social engineering attack
involves manipulating users
psychologically and extracting
confidential or sensitive data
from them by gaining their
trust. The attacker generally
exploits the trust of people or
users by relying on their
cognitive basis.
POLYMORPHIC
ATTACKS
Poly means “many” and morph
means “form”; polymorphic
attacks are those in which
attacker adopts multiple forms
and changes them so that they
are not recognized easily.
These kinds of attacks are
difficult to detect due to their
changing forms.
Train members of your organization on known threats.
Work with organizations that prioritize security.
Physical security.
Centralized control to grant and revoke permission.
Role based access.
Encourage password etiquette: Use strong passwords, set up 2FA
STEPS TO ENSURE COMPUTER SECURITY
EMPLOYEES
Mask private information
Use appropriate guidelines while storing and transmitting data
Delete personal information that is not required
STEPS TO ENSURE COMPUTER SECURITY
CUSTOMER INFORMATION
Email security: Spam protection, malware protection
Encrypt data storage
Block potentially malicious websites
Anti malware, AntiVirus Suite
Devices that are connected to your organization network are
classified as endpoints. Endpoint security includes:
STEPS TO ENSURE COMPUTER SECURITY
ENDPOINT SECURITY
Use automated software to push patches to devices
Managed IT procurement if possible
Use licensed software only
STEPS TO ENSURE COMPUTER SECURITY
USE SECURE AND UPDATED SOFTWARE
Regularly backup important data
Setup centralized backups
STEPS TO ENSURE COMPUTER SECURITY
SETUP DATA RECOVERY
Innovate Today, Inspire Tomorrow

More Related Content

Similar to Computer Security 101 by Montaigne

Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
Khappiyo
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
ManassahIjudigal
 
1 ijaems sept-2015-3-different attacks in the network a review
1 ijaems sept-2015-3-different attacks in the network  a review1 ijaems sept-2015-3-different attacks in the network  a review
1 ijaems sept-2015-3-different attacks in the network a review
INFOGAIN PUBLICATION
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
Information security
Information securityInformation security
Information security
IshaRana14
 
iTM ppt....pptx
iTM ppt....pptxiTM ppt....pptx
iTM ppt....pptx
NehaKumari203874
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
himanshuratnama
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
 
Cyber security
Cyber securityCyber security
Cyber security
Akdu095
 
Cyber security
Cyber security Cyber security
Cyber security
ankit yadav
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
New Horizons Bulgaria
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
cyberprosocial
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
TanushreeChakraborty27
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
Tapan Khilar
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsCybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Samuel862293
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
SharmaAnirudh2
 
Gopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptxGopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptx
gopalhalder8
 

Similar to Computer Security 101 by Montaigne (20)

Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
1 ijaems sept-2015-3-different attacks in the network a review
1 ijaems sept-2015-3-different attacks in the network  a review1 ijaems sept-2015-3-different attacks in the network  a review
1 ijaems sept-2015-3-different attacks in the network a review
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information security
Information securityInformation security
Information security
 
iTM ppt....pptx
iTM ppt....pptxiTM ppt....pptx
iTM ppt....pptx
 
cyber security
cyber security cyber security
cyber security
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsCybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Gopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptxGopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptx
 

Recently uploaded

一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
aozcue
 
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
andreassenrolf537
 
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
PinkySharma900491
 
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
aozcue
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
freshgammer09
 
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Peter Gallagher
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
peuce
 

Recently uploaded (7)

一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
 
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
 
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
 
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
 
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
 

Computer Security 101 by Montaigne

  • 2. COMPUTER SECURITY Back to Agenda Page Refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues.
  • 3. Securing our computers, electronic devices, networks , programs and systems from cyber attacks. Cyber attacks are those attacks that happen when our system is connected to the Internet. 4 TYPES OF COMPUTER SECURITY Protection of the networking infrastructure from unauthorized access, misuse, or theft. It involves creating a secure infrastructure for devices, applications and users, to work in a secure manner. Securing applications and data so that they don’t get hacked and databases of the applications remain safe and private, so that user’s data remains confidential. Protecting our system’s information from theft, illegal use and piracy. It has three objectives: confidentiality, integrity, and availability of information. CYBER SECURITY INFORMATION SECURITY APPLICATION SECURITY NETWORK SECURITY
  • 5. DOS A "Denial of Service" attack occurs when the attackers disrupt the services of the particular network by sending infinite requests and temporary or permanently making the network or machine resources unavailable to the intended audience.
  • 6. BACKDOOR In a backdoor attack, malware or virus gets installed in our system and starts affecting it’s security along with the main file. For example: Installing software from the Internet and unknowingly, along with this software, a malicious file also gets installed. On execution of the installed software, that file’s malware starts affecting your computer security.
  • 7. EAVESDROPPING Eavesdropping is the act of listening to a private computer communication, typically between hosts on a network. Programs such as Carnivore and NarusInSight have been used by the FBI and NSA to eavesdrop on the systems of ISPs. Even machines that operate as a closed systems can be eavesdropped upon by monitoring the faint electromagnetic transmissions generated by the hardware. TEMPEST is a specification by the NSA referring to these attacks.
  • 8. PHISHING While fishing, we catch fish by luring them with bait. Similarly, in phishing, a user is tricked by the attacker or fake website who gains the trust of the user and steals information such as login details, bank details, card number etc. Phishing can be of different types such as voice phishing, text phishing etc.
  • 9. SPOOFING Spoofing is the act of masquerading as a valid entity through falsification of data (such as an IP address or username), in order to gain access to information or resources that one is otherwise unauthorized to obtain. Spoofing is of several types- email spoofing, IP address spoofing, MAC spoofing , biometric spoofing etc.
  • 10. MALWARE Malware is made up of two terms: Malicious + Software = Malware. Malware intrudes the system and is designed to damage our computers. Different types of malware are adware, spyware, ransomware, Trojan horse, etc.
  • 11. SOCIAL ENGINEERING Social engineering attack involves manipulating users psychologically and extracting confidential or sensitive data from them by gaining their trust. The attacker generally exploits the trust of people or users by relying on their cognitive basis.
  • 12. POLYMORPHIC ATTACKS Poly means “many” and morph means “form”; polymorphic attacks are those in which attacker adopts multiple forms and changes them so that they are not recognized easily. These kinds of attacks are difficult to detect due to their changing forms.
  • 13. Train members of your organization on known threats. Work with organizations that prioritize security. Physical security. Centralized control to grant and revoke permission. Role based access. Encourage password etiquette: Use strong passwords, set up 2FA STEPS TO ENSURE COMPUTER SECURITY EMPLOYEES
  • 14. Mask private information Use appropriate guidelines while storing and transmitting data Delete personal information that is not required STEPS TO ENSURE COMPUTER SECURITY CUSTOMER INFORMATION
  • 15. Email security: Spam protection, malware protection Encrypt data storage Block potentially malicious websites Anti malware, AntiVirus Suite Devices that are connected to your organization network are classified as endpoints. Endpoint security includes: STEPS TO ENSURE COMPUTER SECURITY ENDPOINT SECURITY
  • 16. Use automated software to push patches to devices Managed IT procurement if possible Use licensed software only STEPS TO ENSURE COMPUTER SECURITY USE SECURE AND UPDATED SOFTWARE
  • 17. Regularly backup important data Setup centralized backups STEPS TO ENSURE COMPUTER SECURITY SETUP DATA RECOVERY