SlideShare a Scribd company logo
CHAPTER 1: INFORMATION
AND COMMUNICATION
TECHNOLOGY
Computer security
Computer Security
Means protecting our computer system and the
information they contains against unwanted access,
damage, destruction or modification.
Computer Threads
Malicious code
   Is a computer program that perform unauthorized processed an a
    computer or network
   There are various kinds of malicious code:
     i)       Virus
     ii)      Trojan horse
     iii)     Logic bomb
     iv)      Trapdoor
     v)       Worm
           Differences between worm and virus are:
                     WORM                                    VIRUS
    Operates through the network             Spreads through any medium
    Spread copies of itself as a stand alone Spread copies of itself as a program
    program                                  that attaches to other program
   A computer infected by a virus, worm or trojan
    horse has one or more of the following symptoms:
       Screen displays unusual message or image
       Music or unusual sound plays randomly
       Available memory is less than expected
       Existing programs and files disappear
       Files become corrupted
Hacking
 Hacking refer to unauthorized access to the

  computer system by a hacker
 A hacker is a person who accessed a computer or

  network illegally
 A cracker also is someone who accessed a

  computer or network illegally but has to intend of
  destroying data, stealing information or other
  malicious action
Nature threads
 Computers are threatened by natural or

  environmental disaster. Be it at home, stores, offices
  and also automobiles
 Examples: flood, fire, earthquakes, storms,

  tornados, excessive heat and inadequate power
Theft
 Two types of theft

    i)     Computer is used to steal money, goods, information
           and resources
    ii)    Stealing of computers especially notebook and PDA
   3 approaches to prevent theft:
    i)     Prevent access by using locks, smart card or
           password
    ii)    Prevent portability by restricting the hardware from
           being moved
    iii)   Detect and guard all exits and record any hardware
Security Measures
   Security measures are measures taken as a
    precaution against theft or espionage or sabotage
    or possible danger or failure
   Usually we use antivirus, cryptography, firewall and
    data backup to protect sensitive information
Anti-virus
 Is a utility program that we use to protect a computer

  against viruses by identifying and removing computer
  viruses found in the computer memory, computer storage or
  incoming e-mails files
 Examples:

                Norton Antivirus
                AVG
                Kaspersky
                Bitdefender
                Nod32
Anti-spyware
 Is a utility program that we use to protect the

  computers from spyware
 Spyware is a software or computer program that is

  designed secretly record and report an individual’s
  activities on the Internet
 Examples:

               Spybot Search and Destroy
               Ad-ware
               Spyware Blaster
Firewall
 Is a piece of hardware or software which functions in

  a networked environment to prevent some
  communications forbidden by security policy
 We use firewall to prevent hacking (access is the

  use of a computer or network without permission)
                                Types of firewall
  SCREENING ROUTERS            PROXY GATEWAY                   GUARD
 simplest                  • some what complex     • most complex
 sees only addresses and   • sees full text of     • sees full text of
service protocol type       communication           communication
Backup
 Is a utility program that makes copy of all files that

  have been saved onto a disk
 Backup data is important when original data is

  corrupted
 When data corrupted, it is spoilt and cannot be

  properly used because it has become changed in
  wrong ways
Cryptography
 Is a process of transforming plaintext into cipheart

  then back again
 Encryption is a process of converting plaintext into

  cipertext. Decryption is the process of converting
  ciphertext into plaintext
 Encryption was used only by intelligence services,

  militaries and banks. We use cryptography to
  secure the information and prevent hacking or
  unauthorized access.
plaintext   encrypt   ciphertext



plaintext   decrypt   ciphertext
Human aspects
 The user and also the intruder of a computer system

 The hardest aspects to give protection

 The most common problem of human aspect security

  is the lack of achieving a good information
  security procedure
COMPUTER SECURITY

More Related Content

What's hot

HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
Vikas Saw
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
PrakharPrasoon
 
Cyber security
Cyber securityCyber security
Cyber security
TanmoyMaitra
 
Chapter11
Chapter11Chapter11
Chapter11
Izaham
 
E secuity
E secuityE secuity
E secuity
arpit sadana
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
Madhushree Shettigar
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
Computer security
Computer securityComputer security
Computer security
RoshanMaharjan13
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer Crime
Dhrumil Panchal
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
mayur_ceh
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3Suad 00
 

What's hot (20)

HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter11
Chapter11Chapter11
Chapter11
 
E secuity
E secuityE secuity
E secuity
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
Computer security
Computer securityComputer security
Computer security
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer Crime
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
 

Viewers also liked

HARDWARE
HARDWAREHARDWARE
HARDWARE
Kak Yong
 
PRIMARY STORAGE
PRIMARY STORAGEPRIMARY STORAGE
PRIMARY STORAGEKak Yong
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksKak Yong
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyKak Yong
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programmingKak Yong
 
INPUT DEVICE
INPUT DEVICEINPUT DEVICE
INPUT DEVICE
Kak Yong
 
PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE Kak Yong
 
SYSTEM CONCEPT
SYSTEM CONCEPTSYSTEM CONCEPT
SYSTEM CONCEPT
Kak Yong
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICTKak Yong
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsKak Yong
 

Viewers also liked (11)

STORAGE
STORAGESTORAGE
STORAGE
 
HARDWARE
HARDWAREHARDWARE
HARDWARE
 
PRIMARY STORAGE
PRIMARY STORAGEPRIMARY STORAGE
PRIMARY STORAGE
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programming
 
INPUT DEVICE
INPUT DEVICEINPUT DEVICE
INPUT DEVICE
 
PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE
 
SYSTEM CONCEPT
SYSTEM CONCEPTSYSTEM CONCEPT
SYSTEM CONCEPT
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
 

Similar to COMPUTER SECURITY

Computer security
Computer securityComputer security
Computer security
fiza1975
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2smktsj2
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
nazar60
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
KarthikShivanand
 
SECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptxSECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptx
Fari84
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 

Similar to COMPUTER SECURITY (20)

Computer security
Computer securityComputer security
Computer security
 
Notacd02
Notacd02Notacd02
Notacd02
 
Notacd02
Notacd02Notacd02
Notacd02
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2
 
Data security
Data securityData security
Data security
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Computer security and
Computer security andComputer security and
Computer security and
 
Internet security
Internet securityInternet security
Internet security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Computer security
Computer securityComputer security
Computer security
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
SECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptxSECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptx
 
cyber security
cyber security cyber security
cyber security
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 

More from Kak Yong

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
Kak Yong
 
Module programming
Module programmingModule programming
Module programmingKak Yong
 
Module info systems
Module info systemsModule info systems
Module info systemsKak Yong
 
Module ict society
Module ict societyModule ict society
Module ict societyKak Yong
 
Module computer systems
Module computer systemsModule computer systems
Module computer systemsKak Yong
 
Module networks
Module networksModule networks
Module networksKak Yong
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaKak Yong
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsKak Yong
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Kak Yong
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Kak Yong
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Kak Yong
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Kak Yong
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Kak Yong
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Kak Yong
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Kak Yong
 
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Kak Yong
 
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01Kak Yong
 
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02Kak Yong
 
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02Kak Yong
 

More from Kak Yong (20)

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
 
Module programming
Module programmingModule programming
Module programming
 
Module info systems
Module info systemsModule info systems
Module info systems
 
Module ict society
Module ict societyModule ict society
Module ict society
 
Module computer systems
Module computer systemsModule computer systems
Module computer systems
 
Module networks
Module networksModule networks
Module networks
 
Synopsis
SynopsisSynopsis
Synopsis
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimedia
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02
 
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
 
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
 
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
 
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
 

Recently uploaded

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 

COMPUTER SECURITY

  • 1. CHAPTER 1: INFORMATION AND COMMUNICATION TECHNOLOGY Computer security
  • 2. Computer Security Means protecting our computer system and the information they contains against unwanted access, damage, destruction or modification.
  • 3. Computer Threads Malicious code  Is a computer program that perform unauthorized processed an a computer or network  There are various kinds of malicious code: i) Virus ii) Trojan horse iii) Logic bomb iv) Trapdoor v) Worm  Differences between worm and virus are: WORM VIRUS Operates through the network Spreads through any medium Spread copies of itself as a stand alone Spread copies of itself as a program program that attaches to other program
  • 4. A computer infected by a virus, worm or trojan horse has one or more of the following symptoms:  Screen displays unusual message or image  Music or unusual sound plays randomly  Available memory is less than expected  Existing programs and files disappear  Files become corrupted
  • 5. Hacking  Hacking refer to unauthorized access to the computer system by a hacker  A hacker is a person who accessed a computer or network illegally  A cracker also is someone who accessed a computer or network illegally but has to intend of destroying data, stealing information or other malicious action
  • 6. Nature threads  Computers are threatened by natural or environmental disaster. Be it at home, stores, offices and also automobiles  Examples: flood, fire, earthquakes, storms, tornados, excessive heat and inadequate power
  • 7. Theft  Two types of theft i) Computer is used to steal money, goods, information and resources ii) Stealing of computers especially notebook and PDA  3 approaches to prevent theft: i) Prevent access by using locks, smart card or password ii) Prevent portability by restricting the hardware from being moved iii) Detect and guard all exits and record any hardware
  • 8. Security Measures  Security measures are measures taken as a precaution against theft or espionage or sabotage or possible danger or failure  Usually we use antivirus, cryptography, firewall and data backup to protect sensitive information
  • 9. Anti-virus  Is a utility program that we use to protect a computer against viruses by identifying and removing computer viruses found in the computer memory, computer storage or incoming e-mails files  Examples: Norton Antivirus AVG Kaspersky Bitdefender Nod32
  • 10. Anti-spyware  Is a utility program that we use to protect the computers from spyware  Spyware is a software or computer program that is designed secretly record and report an individual’s activities on the Internet  Examples: Spybot Search and Destroy Ad-ware Spyware Blaster
  • 11. Firewall  Is a piece of hardware or software which functions in a networked environment to prevent some communications forbidden by security policy  We use firewall to prevent hacking (access is the use of a computer or network without permission) Types of firewall SCREENING ROUTERS PROXY GATEWAY GUARD  simplest • some what complex • most complex  sees only addresses and • sees full text of • sees full text of service protocol type communication communication
  • 12. Backup  Is a utility program that makes copy of all files that have been saved onto a disk  Backup data is important when original data is corrupted  When data corrupted, it is spoilt and cannot be properly used because it has become changed in wrong ways
  • 13. Cryptography  Is a process of transforming plaintext into cipheart then back again  Encryption is a process of converting plaintext into cipertext. Decryption is the process of converting ciphertext into plaintext  Encryption was used only by intelligence services, militaries and banks. We use cryptography to secure the information and prevent hacking or unauthorized access.
  • 14. plaintext encrypt ciphertext plaintext decrypt ciphertext
  • 15. Human aspects  The user and also the intruder of a computer system  The hardest aspects to give protection  The most common problem of human aspect security is the lack of achieving a good information security procedure