“COMPUTER
SECURITY”
1
CONTENTS
 CYBERCRIME
• Computer Criminals
• Methods Used by Computer Criminals
 COMPUTER SECURITY
• Importance of Computer Security
• Disaster Of Security Violation
• Security Threats
• Measures To Protect Computer Security
 PERSONAL COMPUTER SECURITY
 BACKUP OF DATA
• Purpose Of Backup
• Types Of Backup
• Media For Data Backup
 COMPUTER VIRUS
• Damage Caused By Computer Virus
2
3
CYBERCRIME
 Crime committed using a computer
and the internet to steal data or
personal information.
 For example, fraud, kidnapping,
murder, stealing money from bank
account.
 In other case, computer can be a target
of cybercrime such as unauthorized
access to a computer to spread virus on
it.
 Somebody's identity is stolen every 3
seconds as a result of cyber crime.
4
COMPUTER CRIMINALS
 The person who commit computer crimes are known as
computer criminals.
 Types of computer criminals:
1. Hacker:
A person who accesses a computer, network and its
resources illegally.
2. Cracker:
A person who accesses a computer and network illegally for
some negative purpose. the crackers have advanced
computer and network skills.
2. Script kiddie:
A person who uses existing computer scripts or codes to
hack into computers, without technical knowledge.
3. Corporate spy:
A person who is hired to break into a computer is called
corporate spy. They have an excellent computer and network
skills.
5
COMPUTER CRIMINALS
4. Unethical employees:
Getting financial gains by selling confidential
information. Some unhappy employees may do this
to get revenge.
5. Cyber extortionist:
Uses email as a tool for extortion. Such person send
email to a company with threat. They tell company to
pay money or they will expose confidential
information of company.
6. Cyber terrorist:
Uses the internet to destroy computers for political
reason. For example, they may destroy air traffic
control system or telecommunication system of the
country.
6
METHODS USED BY COMPUTER CRIMINALS
 Denial of service:
It slows down a computer or network. It
floods a computer or network with requests
for data. The server under attack receives so
many requests that it cannot respond to
legitimate users.
 Piggybacking:
Entering the system by riding on the back of
an authorized user. It occurs when an
authorized user dose not log off the system.
An illegal user may continue where the
original user left.
 Salami technique:
Getting small amount of money illegally from
a large financial system.
7
METHODS USED BY COMPUTER CRIMINALS
 Scavenging:
Searching company’s trash cans to find useful
information or bank account numbers etc.
 Trap door:
An illegitimate program that is left within a
completed legitimate program. It allows entry by
unauthorized user to change program.
 Trojan horse:
A program that hides itself within a useful
program and executes illegal instructions in the
middle of the program.
 Zapping:
The zapping software is designed to bypass all
security systems.
8
9
COMPUTER SECURITY
 Is the protection of information
systems from theft or damage to the
hardware, the software, and to the
information on them.
10
IMPORTANCE OF COMPUTER SECURITY
 The most important objective of
computer security are as follows:
1. It make sure that a computer is not
used without permission.
2. It make sure that the hardware is not
damaged or stolen.
3. It make sure that confidential
information is not used without
permission.
4. It make sure that the system works
without any problem.
11
DISASTER OF SECURITY VIOLATION
 Loss of hardware:
Security violation may cause loss of hardware in
organization. For example, an unauthorized user
may steal an equipment etc.
 Loss of processing ability:
An organization may face severe loss if processing
ability is suspended. For example, a bank can lose
the business if the system stops processing.
 Loss of software:
The system may not work properly if the software
files are damaged or deleted.
 Loss of data:
An organization cannot work properly if important
data is lost. It is difficult to recollect lost data again
for big organization.
12
SECURITY THREATS
 Computer security threat can be a
computer program, an event or a
person that violates computer
security. It may cause loss of data
and stealing of information. It may
also effect the working of computer.
13
1. HACKER
Hacker is a person who breaks into computer,
network and its resources illegally.
Some organizations hire hackers to check the
security of the system and identity of their
network system. Such hackers are called white
hat hackers or ethical hackers.
Problems caused by hackers:
The hacker may steal the following:
• Information of the client or customer
• Credit card detail for unauthorized use
• Passwords to access computers and
networks illegally
• Email password to use email account
without user’s knowledge.
14
2. HARDWARE THEFT AND VANDALISM
 Hardware theft is a process of
stealing the hardware equipment
such as hard disk or monitor etc.
hardware vandalism is a process of
defensing the hardware equipment.
For example, an employee in an
organization may damage keyboard
or cut the wires etc.
15
3. SOFTWARE THEFT
 Software theft means that a person
can steal software media, erase
software program or copy it without
permission. For example, someone
can steal the CD-ROM that contains
the software program.
16
4. INFORMATION THEFT
 Process of stealing personal
information without permission. The
stolen information can be further
used for illegal activities. For example
someone may steal the credit card
number of another person and us it
to bye things online.
17
5. SYSTEM FAILURE
 Occurs when system do not function
properly for longer time. System
failure may cause further loss of data,
software and hardware etc. it occurs
due to many reasons such as natural
disasters such as flood, fire or storm
and fluctuation in power supply etc.
18
6. VIRUSES
 A computer virus is one of the most
familiar forms of risk to computer
security. A virus is program that may
disturb the normal working of
computer. Virus attach itself to file
stored on flash drive, email
attachment and hard disks.
 A virus can:
• Damage data or software
• Delete some or all files
• Destroy all data by formatting hard
drive
• Display a false message.
19
7. DENIAL OF SERVICE ATTACK
 It slows down a computer or
network. It floods a computer or
network with requests for data. The
server under attack receives so many
requests that it cannot respond to
legitimate users.
20
MEASURES TO PROTECT COMPUTER SECURITY
1. Disaster recovery plan:
is a safety system that is used to restore
the system after a complete data loss.
 Use of manual system
An organization can use manual system
incase of disaster.
 Mutual aid pact
An organization can utilize manual aid
pact if signal act like fire destroys the
processing facility.
21
MEASURES TO PROTECT COMPUTER SECURITY
 Hot site
Is a fully equipped computer center. It
contains hardware, security and
communication facilities etc.
 Cold site
Provides an environment only. An
organization can install its own
computer system and use in case of
disaster.
22
2. USER RIGHTS
 The users must be assigned proper
rights to minimize security threats.
Every authorized user should not be
allowed to change or delete data.
3. Firewall
 A firewall is a set combination of
hardware and software that prevents
unauthorized access to a network.
23
3. BACKUP
 An addition copy of data or
information stored on secondary
storage media is called backup. The
data stored on the system may also be
lost, deleted or altered.
4. Password
 Password is secret word that is used to
protect a computer system or program.
The user has to type the password to
access the computer. The purpose of
password is to protect data.
24
6. ENCRYPTION
 Encryption is the process of encoding
data so that only authorized user
may understand or use it.
7. SCANNING
 The data provided to the
organization must be scanned before
use. Proper virus scanning software
should be used to scan all data.
25
PERSONAL COMPUTERR SECURITY
 Avoid extreme conditions
Computer should not be placed in
extreme conditions. It should be placed
in an environment that is free from dust
and moisture.
 Avoid virus
Anti virus software must be installed on
computer.
 Guard program and data
The disks must be placed safely in lock.
The backup must be stored in a safe
location.
26
BACKUP OF DATA
 An additional copy of data or information
stored on secondary storage media is
called the backup of data. the common
media of a backup are zip disk, magnetic
tape, USB and hard disk etc.
Purpose of backup
1. An important file can be deleted.
2. Mechanical failure in the computer may
result in loss of computer data.
3. Virus may damage the data stored on the
computer.
4. Computer may be stolen by any body.
5. Computer may be damaged due to fire or
power failure.
It is very important to take backup of data.
27
TYPES OF BACKUP
 COMPLETE BACKUP
Backup of all data on hard disk is called
complete backup.
 INCREMENTAL BACKUP
Creates a copy of only the data that is
newly created or modified since the last
backup this process porformed
automatically in some software.
28
MEDIA FOR DATA BACKUP
 USB Flash Drive
 External Hard Disk
 Magnetic Tape
29
COMPUTER VIRUS
 A virus is program that may disturb the normal
working of computer. Virus attach itself to file
stored on flash drive, email attachment and
hard disks.
DAMAGED CAUSED BY
VIRUS
 A virus can:
• Damage data or software
• Delete some or all files
• Destroy all data by formatting hard drive
• Display a false message.
30
CAUSES OF COMPUTER VIRUS
1. Infected flash drives
2. Email attachment
3. Insecure websites
4. Networks
5. Pirated software
31
PROTECTION FROM VIRUS
1. The anti-virus should be installed on
the computer.
2. Anti-virus software must be
upgraded regularly.
3. Floppies must be scanned before use.
4. Unknown emails should not be
opened.
5. Pirated software should not be
installed.
32
THANK YOU!!!
33

Computer security

  • 1.
  • 2.
    CONTENTS  CYBERCRIME • ComputerCriminals • Methods Used by Computer Criminals  COMPUTER SECURITY • Importance of Computer Security • Disaster Of Security Violation • Security Threats • Measures To Protect Computer Security  PERSONAL COMPUTER SECURITY  BACKUP OF DATA • Purpose Of Backup • Types Of Backup • Media For Data Backup  COMPUTER VIRUS • Damage Caused By Computer Virus 2
  • 3.
  • 4.
    CYBERCRIME  Crime committedusing a computer and the internet to steal data or personal information.  For example, fraud, kidnapping, murder, stealing money from bank account.  In other case, computer can be a target of cybercrime such as unauthorized access to a computer to spread virus on it.  Somebody's identity is stolen every 3 seconds as a result of cyber crime. 4
  • 5.
    COMPUTER CRIMINALS  Theperson who commit computer crimes are known as computer criminals.  Types of computer criminals: 1. Hacker: A person who accesses a computer, network and its resources illegally. 2. Cracker: A person who accesses a computer and network illegally for some negative purpose. the crackers have advanced computer and network skills. 2. Script kiddie: A person who uses existing computer scripts or codes to hack into computers, without technical knowledge. 3. Corporate spy: A person who is hired to break into a computer is called corporate spy. They have an excellent computer and network skills. 5
  • 6.
    COMPUTER CRIMINALS 4. Unethicalemployees: Getting financial gains by selling confidential information. Some unhappy employees may do this to get revenge. 5. Cyber extortionist: Uses email as a tool for extortion. Such person send email to a company with threat. They tell company to pay money or they will expose confidential information of company. 6. Cyber terrorist: Uses the internet to destroy computers for political reason. For example, they may destroy air traffic control system or telecommunication system of the country. 6
  • 7.
    METHODS USED BYCOMPUTER CRIMINALS  Denial of service: It slows down a computer or network. It floods a computer or network with requests for data. The server under attack receives so many requests that it cannot respond to legitimate users.  Piggybacking: Entering the system by riding on the back of an authorized user. It occurs when an authorized user dose not log off the system. An illegal user may continue where the original user left.  Salami technique: Getting small amount of money illegally from a large financial system. 7
  • 8.
    METHODS USED BYCOMPUTER CRIMINALS  Scavenging: Searching company’s trash cans to find useful information or bank account numbers etc.  Trap door: An illegitimate program that is left within a completed legitimate program. It allows entry by unauthorized user to change program.  Trojan horse: A program that hides itself within a useful program and executes illegal instructions in the middle of the program.  Zapping: The zapping software is designed to bypass all security systems. 8
  • 9.
  • 10.
    COMPUTER SECURITY  Isthe protection of information systems from theft or damage to the hardware, the software, and to the information on them. 10
  • 11.
    IMPORTANCE OF COMPUTERSECURITY  The most important objective of computer security are as follows: 1. It make sure that a computer is not used without permission. 2. It make sure that the hardware is not damaged or stolen. 3. It make sure that confidential information is not used without permission. 4. It make sure that the system works without any problem. 11
  • 12.
    DISASTER OF SECURITYVIOLATION  Loss of hardware: Security violation may cause loss of hardware in organization. For example, an unauthorized user may steal an equipment etc.  Loss of processing ability: An organization may face severe loss if processing ability is suspended. For example, a bank can lose the business if the system stops processing.  Loss of software: The system may not work properly if the software files are damaged or deleted.  Loss of data: An organization cannot work properly if important data is lost. It is difficult to recollect lost data again for big organization. 12
  • 13.
    SECURITY THREATS  Computersecurity threat can be a computer program, an event or a person that violates computer security. It may cause loss of data and stealing of information. It may also effect the working of computer. 13
  • 14.
    1. HACKER Hacker isa person who breaks into computer, network and its resources illegally. Some organizations hire hackers to check the security of the system and identity of their network system. Such hackers are called white hat hackers or ethical hackers. Problems caused by hackers: The hacker may steal the following: • Information of the client or customer • Credit card detail for unauthorized use • Passwords to access computers and networks illegally • Email password to use email account without user’s knowledge. 14
  • 15.
    2. HARDWARE THEFTAND VANDALISM  Hardware theft is a process of stealing the hardware equipment such as hard disk or monitor etc. hardware vandalism is a process of defensing the hardware equipment. For example, an employee in an organization may damage keyboard or cut the wires etc. 15
  • 16.
    3. SOFTWARE THEFT Software theft means that a person can steal software media, erase software program or copy it without permission. For example, someone can steal the CD-ROM that contains the software program. 16
  • 17.
    4. INFORMATION THEFT Process of stealing personal information without permission. The stolen information can be further used for illegal activities. For example someone may steal the credit card number of another person and us it to bye things online. 17
  • 18.
    5. SYSTEM FAILURE Occurs when system do not function properly for longer time. System failure may cause further loss of data, software and hardware etc. it occurs due to many reasons such as natural disasters such as flood, fire or storm and fluctuation in power supply etc. 18
  • 19.
    6. VIRUSES  Acomputer virus is one of the most familiar forms of risk to computer security. A virus is program that may disturb the normal working of computer. Virus attach itself to file stored on flash drive, email attachment and hard disks.  A virus can: • Damage data or software • Delete some or all files • Destroy all data by formatting hard drive • Display a false message. 19
  • 20.
    7. DENIAL OFSERVICE ATTACK  It slows down a computer or network. It floods a computer or network with requests for data. The server under attack receives so many requests that it cannot respond to legitimate users. 20
  • 21.
    MEASURES TO PROTECTCOMPUTER SECURITY 1. Disaster recovery plan: is a safety system that is used to restore the system after a complete data loss.  Use of manual system An organization can use manual system incase of disaster.  Mutual aid pact An organization can utilize manual aid pact if signal act like fire destroys the processing facility. 21
  • 22.
    MEASURES TO PROTECTCOMPUTER SECURITY  Hot site Is a fully equipped computer center. It contains hardware, security and communication facilities etc.  Cold site Provides an environment only. An organization can install its own computer system and use in case of disaster. 22
  • 23.
    2. USER RIGHTS The users must be assigned proper rights to minimize security threats. Every authorized user should not be allowed to change or delete data. 3. Firewall  A firewall is a set combination of hardware and software that prevents unauthorized access to a network. 23
  • 24.
    3. BACKUP  Anaddition copy of data or information stored on secondary storage media is called backup. The data stored on the system may also be lost, deleted or altered. 4. Password  Password is secret word that is used to protect a computer system or program. The user has to type the password to access the computer. The purpose of password is to protect data. 24
  • 25.
    6. ENCRYPTION  Encryptionis the process of encoding data so that only authorized user may understand or use it. 7. SCANNING  The data provided to the organization must be scanned before use. Proper virus scanning software should be used to scan all data. 25
  • 26.
    PERSONAL COMPUTERR SECURITY Avoid extreme conditions Computer should not be placed in extreme conditions. It should be placed in an environment that is free from dust and moisture.  Avoid virus Anti virus software must be installed on computer.  Guard program and data The disks must be placed safely in lock. The backup must be stored in a safe location. 26
  • 27.
    BACKUP OF DATA An additional copy of data or information stored on secondary storage media is called the backup of data. the common media of a backup are zip disk, magnetic tape, USB and hard disk etc. Purpose of backup 1. An important file can be deleted. 2. Mechanical failure in the computer may result in loss of computer data. 3. Virus may damage the data stored on the computer. 4. Computer may be stolen by any body. 5. Computer may be damaged due to fire or power failure. It is very important to take backup of data. 27
  • 28.
    TYPES OF BACKUP COMPLETE BACKUP Backup of all data on hard disk is called complete backup.  INCREMENTAL BACKUP Creates a copy of only the data that is newly created or modified since the last backup this process porformed automatically in some software. 28
  • 29.
    MEDIA FOR DATABACKUP  USB Flash Drive  External Hard Disk  Magnetic Tape 29
  • 30.
    COMPUTER VIRUS  Avirus is program that may disturb the normal working of computer. Virus attach itself to file stored on flash drive, email attachment and hard disks. DAMAGED CAUSED BY VIRUS  A virus can: • Damage data or software • Delete some or all files • Destroy all data by formatting hard drive • Display a false message. 30
  • 31.
    CAUSES OF COMPUTERVIRUS 1. Infected flash drives 2. Email attachment 3. Insecure websites 4. Networks 5. Pirated software 31
  • 32.
    PROTECTION FROM VIRUS 1.The anti-virus should be installed on the computer. 2. Anti-virus software must be upgraded regularly. 3. Floppies must be scanned before use. 4. Unknown emails should not be opened. 5. Pirated software should not be installed. 32
  • 33.