SlideShare a Scribd company logo
“COMPUTER
SECURITY”
1
CONTENTS
 CYBERCRIME
• Computer Criminals
• Methods Used by Computer Criminals
 COMPUTER SECURITY
• Importance of Computer Security
• Disaster Of Security Violation
• Security Threats
• Measures To Protect Computer Security
 PERSONAL COMPUTER SECURITY
 BACKUP OF DATA
• Purpose Of Backup
• Types Of Backup
• Media For Data Backup
 COMPUTER VIRUS
• Damage Caused By Computer Virus
2
3
CYBERCRIME
 Crime committed using a computer
and the internet to steal data or
personal information.
 For example, fraud, kidnapping,
murder, stealing money from bank
account.
 In other case, computer can be a target
of cybercrime such as unauthorized
access to a computer to spread virus on
it.
 Somebody's identity is stolen every 3
seconds as a result of cyber crime.
4
COMPUTER CRIMINALS
 The person who commit computer crimes are known as
computer criminals.
 Types of computer criminals:
1. Hacker:
A person who accesses a computer, network and its
resources illegally.
2. Cracker:
A person who accesses a computer and network illegally for
some negative purpose. the crackers have advanced
computer and network skills.
2. Script kiddie:
A person who uses existing computer scripts or codes to
hack into computers, without technical knowledge.
3. Corporate spy:
A person who is hired to break into a computer is called
corporate spy. They have an excellent computer and network
skills.
5
COMPUTER CRIMINALS
4. Unethical employees:
Getting financial gains by selling confidential
information. Some unhappy employees may do this
to get revenge.
5. Cyber extortionist:
Uses email as a tool for extortion. Such person send
email to a company with threat. They tell company to
pay money or they will expose confidential
information of company.
6. Cyber terrorist:
Uses the internet to destroy computers for political
reason. For example, they may destroy air traffic
control system or telecommunication system of the
country.
6
METHODS USED BY COMPUTER CRIMINALS
 Denial of service:
It slows down a computer or network. It
floods a computer or network with requests
for data. The server under attack receives so
many requests that it cannot respond to
legitimate users.
 Piggybacking:
Entering the system by riding on the back of
an authorized user. It occurs when an
authorized user dose not log off the system.
An illegal user may continue where the
original user left.
 Salami technique:
Getting small amount of money illegally from
a large financial system.
7
METHODS USED BY COMPUTER CRIMINALS
 Scavenging:
Searching company’s trash cans to find useful
information or bank account numbers etc.
 Trap door:
An illegitimate program that is left within a
completed legitimate program. It allows entry by
unauthorized user to change program.
 Trojan horse:
A program that hides itself within a useful
program and executes illegal instructions in the
middle of the program.
 Zapping:
The zapping software is designed to bypass all
security systems.
8
9
COMPUTER SECURITY
 Is the protection of information
systems from theft or damage to the
hardware, the software, and to the
information on them.
10
IMPORTANCE OF COMPUTER SECURITY
 The most important objective of
computer security are as follows:
1. It make sure that a computer is not
used without permission.
2. It make sure that the hardware is not
damaged or stolen.
3. It make sure that confidential
information is not used without
permission.
4. It make sure that the system works
without any problem.
11
DISASTER OF SECURITY VIOLATION
 Loss of hardware:
Security violation may cause loss of hardware in
organization. For example, an unauthorized user
may steal an equipment etc.
 Loss of processing ability:
An organization may face severe loss if processing
ability is suspended. For example, a bank can lose
the business if the system stops processing.
 Loss of software:
The system may not work properly if the software
files are damaged or deleted.
 Loss of data:
An organization cannot work properly if important
data is lost. It is difficult to recollect lost data again
for big organization.
12
SECURITY THREATS
 Computer security threat can be a
computer program, an event or a
person that violates computer
security. It may cause loss of data
and stealing of information. It may
also effect the working of computer.
13
1. HACKER
Hacker is a person who breaks into computer,
network and its resources illegally.
Some organizations hire hackers to check the
security of the system and identity of their
network system. Such hackers are called white
hat hackers or ethical hackers.
Problems caused by hackers:
The hacker may steal the following:
• Information of the client or customer
• Credit card detail for unauthorized use
• Passwords to access computers and
networks illegally
• Email password to use email account
without user’s knowledge.
14
2. HARDWARE THEFT AND VANDALISM
 Hardware theft is a process of
stealing the hardware equipment
such as hard disk or monitor etc.
hardware vandalism is a process of
defensing the hardware equipment.
For example, an employee in an
organization may damage keyboard
or cut the wires etc.
15
3. SOFTWARE THEFT
 Software theft means that a person
can steal software media, erase
software program or copy it without
permission. For example, someone
can steal the CD-ROM that contains
the software program.
16
4. INFORMATION THEFT
 Process of stealing personal
information without permission. The
stolen information can be further
used for illegal activities. For example
someone may steal the credit card
number of another person and us it
to bye things online.
17
5. SYSTEM FAILURE
 Occurs when system do not function
properly for longer time. System
failure may cause further loss of data,
software and hardware etc. it occurs
due to many reasons such as natural
disasters such as flood, fire or storm
and fluctuation in power supply etc.
18
6. VIRUSES
 A computer virus is one of the most
familiar forms of risk to computer
security. A virus is program that may
disturb the normal working of
computer. Virus attach itself to file
stored on flash drive, email
attachment and hard disks.
 A virus can:
• Damage data or software
• Delete some or all files
• Destroy all data by formatting hard
drive
• Display a false message.
19
7. DENIAL OF SERVICE ATTACK
 It slows down a computer or
network. It floods a computer or
network with requests for data. The
server under attack receives so many
requests that it cannot respond to
legitimate users.
20
MEASURES TO PROTECT COMPUTER SECURITY
1. Disaster recovery plan:
is a safety system that is used to restore
the system after a complete data loss.
 Use of manual system
An organization can use manual system
incase of disaster.
 Mutual aid pact
An organization can utilize manual aid
pact if signal act like fire destroys the
processing facility.
21
MEASURES TO PROTECT COMPUTER SECURITY
 Hot site
Is a fully equipped computer center. It
contains hardware, security and
communication facilities etc.
 Cold site
Provides an environment only. An
organization can install its own
computer system and use in case of
disaster.
22
2. USER RIGHTS
 The users must be assigned proper
rights to minimize security threats.
Every authorized user should not be
allowed to change or delete data.
3. Firewall
 A firewall is a set combination of
hardware and software that prevents
unauthorized access to a network.
23
3. BACKUP
 An addition copy of data or
information stored on secondary
storage media is called backup. The
data stored on the system may also be
lost, deleted or altered.
4. Password
 Password is secret word that is used to
protect a computer system or program.
The user has to type the password to
access the computer. The purpose of
password is to protect data.
24
6. ENCRYPTION
 Encryption is the process of encoding
data so that only authorized user
may understand or use it.
7. SCANNING
 The data provided to the
organization must be scanned before
use. Proper virus scanning software
should be used to scan all data.
25
PERSONAL COMPUTERR SECURITY
 Avoid extreme conditions
Computer should not be placed in
extreme conditions. It should be placed
in an environment that is free from dust
and moisture.
 Avoid virus
Anti virus software must be installed on
computer.
 Guard program and data
The disks must be placed safely in lock.
The backup must be stored in a safe
location.
26
BACKUP OF DATA
 An additional copy of data or information
stored on secondary storage media is
called the backup of data. the common
media of a backup are zip disk, magnetic
tape, USB and hard disk etc.
Purpose of backup
1. An important file can be deleted.
2. Mechanical failure in the computer may
result in loss of computer data.
3. Virus may damage the data stored on the
computer.
4. Computer may be stolen by any body.
5. Computer may be damaged due to fire or
power failure.
It is very important to take backup of data.
27
TYPES OF BACKUP
 COMPLETE BACKUP
Backup of all data on hard disk is called
complete backup.
 INCREMENTAL BACKUP
Creates a copy of only the data that is
newly created or modified since the last
backup this process porformed
automatically in some software.
28
MEDIA FOR DATA BACKUP
 USB Flash Drive
 External Hard Disk
 Magnetic Tape
29
COMPUTER VIRUS
 A virus is program that may disturb the normal
working of computer. Virus attach itself to file
stored on flash drive, email attachment and
hard disks.
DAMAGED CAUSED BY
VIRUS
 A virus can:
• Damage data or software
• Delete some or all files
• Destroy all data by formatting hard drive
• Display a false message.
30
CAUSES OF COMPUTER VIRUS
1. Infected flash drives
2. Email attachment
3. Insecure websites
4. Networks
5. Pirated software
31
PROTECTION FROM VIRUS
1. The anti-virus should be installed on
the computer.
2. Anti-virus software must be
upgraded regularly.
3. Floppies must be scanned before use.
4. Unknown emails should not be
opened.
5. Pirated software should not be
installed.
32
THANK YOU!!!
33

More Related Content

What's hot

Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Computer security
Computer securityComputer security
Computer security
fiza1975
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Dheeraj Kataria
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 

What's hot (20)

Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Network Security
Network SecurityNetwork Security
Network Security
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer security
Computer securityComputer security
Computer security
 

Similar to Computer security

Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Computer security
Computer securityComputer security
Computer security
RoshanMaharjan13
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
WilsonWanjohi5
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
Tabsheer Hasan
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
JoeMarieDormido2
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
rizwanshafique4321
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
Wollo UNiversity
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
EndAlk15
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
Somesh Kumar
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
RamaNingaiah
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
Ian Dave Balatbat
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
ssuser6c59cb
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
Kirti Verma
 

Similar to Computer security (20)

Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Notacd02
Notacd02Notacd02
Notacd02
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Notacd02
Notacd02Notacd02
Notacd02
 
Computer security
Computer securityComputer security
Computer security
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
Network security
Network securityNetwork security
Network security
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 

More from Ayesha Arshad

Human Resources and Economic Development
Human Resources and Economic DevelopmentHuman Resources and Economic Development
Human Resources and Economic Development
Ayesha Arshad
 
Evaluating Arguments & Truth Claims
Evaluating Arguments & Truth ClaimsEvaluating Arguments & Truth Claims
Evaluating Arguments & Truth Claims
Ayesha Arshad
 
Ethics in business research
Ethics in business researchEthics in business research
Ethics in business research
Ayesha Arshad
 
Cost Accounting
Cost AccountingCost Accounting
Cost Accounting
Ayesha Arshad
 
Business Law
Business LawBusiness Law
Business Law
Ayesha Arshad
 
Analysis Marketing Mix And STP
Analysis Marketing Mix And STPAnalysis Marketing Mix And STP
Analysis Marketing Mix And STP
Ayesha Arshad
 
Recruitment Process of Marketing Executive
Recruitment Process of Marketing ExecutiveRecruitment Process of Marketing Executive
Recruitment Process of Marketing Executive
Ayesha Arshad
 
The Greatest Showman
The Greatest ShowmanThe Greatest Showman
The Greatest Showman
Ayesha Arshad
 
J.K Cement Industry Internal Audit
J.K Cement Industry Internal AuditJ.K Cement Industry Internal Audit
J.K Cement Industry Internal Audit
Ayesha Arshad
 
Bank Audit
Bank AuditBank Audit
Bank Audit
Ayesha Arshad
 
Audit of Hotel
Audit of HotelAudit of Hotel
Audit of Hotel
Ayesha Arshad
 
Chi-Square and Analysis of Variance
Chi-Square and Analysis of VarianceChi-Square and Analysis of Variance
Chi-Square and Analysis of Variance
Ayesha Arshad
 
Sampling
SamplingSampling
Sampling
Ayesha Arshad
 
Creating Customer Value And Engagement
Creating Customer Value And EngagementCreating Customer Value And Engagement
Creating Customer Value And Engagement
Ayesha Arshad
 
World War 1
World War 1World War 1
World War 1
Ayesha Arshad
 
Diplomacy
DiplomacyDiplomacy
Diplomacy
Ayesha Arshad
 
Communication in Personal Selling
Communication in Personal Selling Communication in Personal Selling
Communication in Personal Selling
Ayesha Arshad
 
Line graph bar graph
Line graph bar graphLine graph bar graph
Line graph bar graph
Ayesha Arshad
 
Post Keynesian Approach
Post Keynesian  ApproachPost Keynesian  Approach
Post Keynesian Approach
Ayesha Arshad
 
Social Structure of Pakistan
Social Structure of PakistanSocial Structure of Pakistan
Social Structure of Pakistan
Ayesha Arshad
 

More from Ayesha Arshad (20)

Human Resources and Economic Development
Human Resources and Economic DevelopmentHuman Resources and Economic Development
Human Resources and Economic Development
 
Evaluating Arguments & Truth Claims
Evaluating Arguments & Truth ClaimsEvaluating Arguments & Truth Claims
Evaluating Arguments & Truth Claims
 
Ethics in business research
Ethics in business researchEthics in business research
Ethics in business research
 
Cost Accounting
Cost AccountingCost Accounting
Cost Accounting
 
Business Law
Business LawBusiness Law
Business Law
 
Analysis Marketing Mix And STP
Analysis Marketing Mix And STPAnalysis Marketing Mix And STP
Analysis Marketing Mix And STP
 
Recruitment Process of Marketing Executive
Recruitment Process of Marketing ExecutiveRecruitment Process of Marketing Executive
Recruitment Process of Marketing Executive
 
The Greatest Showman
The Greatest ShowmanThe Greatest Showman
The Greatest Showman
 
J.K Cement Industry Internal Audit
J.K Cement Industry Internal AuditJ.K Cement Industry Internal Audit
J.K Cement Industry Internal Audit
 
Bank Audit
Bank AuditBank Audit
Bank Audit
 
Audit of Hotel
Audit of HotelAudit of Hotel
Audit of Hotel
 
Chi-Square and Analysis of Variance
Chi-Square and Analysis of VarianceChi-Square and Analysis of Variance
Chi-Square and Analysis of Variance
 
Sampling
SamplingSampling
Sampling
 
Creating Customer Value And Engagement
Creating Customer Value And EngagementCreating Customer Value And Engagement
Creating Customer Value And Engagement
 
World War 1
World War 1World War 1
World War 1
 
Diplomacy
DiplomacyDiplomacy
Diplomacy
 
Communication in Personal Selling
Communication in Personal Selling Communication in Personal Selling
Communication in Personal Selling
 
Line graph bar graph
Line graph bar graphLine graph bar graph
Line graph bar graph
 
Post Keynesian Approach
Post Keynesian  ApproachPost Keynesian  Approach
Post Keynesian Approach
 
Social Structure of Pakistan
Social Structure of PakistanSocial Structure of Pakistan
Social Structure of Pakistan
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Computer security

  • 2. CONTENTS  CYBERCRIME • Computer Criminals • Methods Used by Computer Criminals  COMPUTER SECURITY • Importance of Computer Security • Disaster Of Security Violation • Security Threats • Measures To Protect Computer Security  PERSONAL COMPUTER SECURITY  BACKUP OF DATA • Purpose Of Backup • Types Of Backup • Media For Data Backup  COMPUTER VIRUS • Damage Caused By Computer Virus 2
  • 3. 3
  • 4. CYBERCRIME  Crime committed using a computer and the internet to steal data or personal information.  For example, fraud, kidnapping, murder, stealing money from bank account.  In other case, computer can be a target of cybercrime such as unauthorized access to a computer to spread virus on it.  Somebody's identity is stolen every 3 seconds as a result of cyber crime. 4
  • 5. COMPUTER CRIMINALS  The person who commit computer crimes are known as computer criminals.  Types of computer criminals: 1. Hacker: A person who accesses a computer, network and its resources illegally. 2. Cracker: A person who accesses a computer and network illegally for some negative purpose. the crackers have advanced computer and network skills. 2. Script kiddie: A person who uses existing computer scripts or codes to hack into computers, without technical knowledge. 3. Corporate spy: A person who is hired to break into a computer is called corporate spy. They have an excellent computer and network skills. 5
  • 6. COMPUTER CRIMINALS 4. Unethical employees: Getting financial gains by selling confidential information. Some unhappy employees may do this to get revenge. 5. Cyber extortionist: Uses email as a tool for extortion. Such person send email to a company with threat. They tell company to pay money or they will expose confidential information of company. 6. Cyber terrorist: Uses the internet to destroy computers for political reason. For example, they may destroy air traffic control system or telecommunication system of the country. 6
  • 7. METHODS USED BY COMPUTER CRIMINALS  Denial of service: It slows down a computer or network. It floods a computer or network with requests for data. The server under attack receives so many requests that it cannot respond to legitimate users.  Piggybacking: Entering the system by riding on the back of an authorized user. It occurs when an authorized user dose not log off the system. An illegal user may continue where the original user left.  Salami technique: Getting small amount of money illegally from a large financial system. 7
  • 8. METHODS USED BY COMPUTER CRIMINALS  Scavenging: Searching company’s trash cans to find useful information or bank account numbers etc.  Trap door: An illegitimate program that is left within a completed legitimate program. It allows entry by unauthorized user to change program.  Trojan horse: A program that hides itself within a useful program and executes illegal instructions in the middle of the program.  Zapping: The zapping software is designed to bypass all security systems. 8
  • 9. 9
  • 10. COMPUTER SECURITY  Is the protection of information systems from theft or damage to the hardware, the software, and to the information on them. 10
  • 11. IMPORTANCE OF COMPUTER SECURITY  The most important objective of computer security are as follows: 1. It make sure that a computer is not used without permission. 2. It make sure that the hardware is not damaged or stolen. 3. It make sure that confidential information is not used without permission. 4. It make sure that the system works without any problem. 11
  • 12. DISASTER OF SECURITY VIOLATION  Loss of hardware: Security violation may cause loss of hardware in organization. For example, an unauthorized user may steal an equipment etc.  Loss of processing ability: An organization may face severe loss if processing ability is suspended. For example, a bank can lose the business if the system stops processing.  Loss of software: The system may not work properly if the software files are damaged or deleted.  Loss of data: An organization cannot work properly if important data is lost. It is difficult to recollect lost data again for big organization. 12
  • 13. SECURITY THREATS  Computer security threat can be a computer program, an event or a person that violates computer security. It may cause loss of data and stealing of information. It may also effect the working of computer. 13
  • 14. 1. HACKER Hacker is a person who breaks into computer, network and its resources illegally. Some organizations hire hackers to check the security of the system and identity of their network system. Such hackers are called white hat hackers or ethical hackers. Problems caused by hackers: The hacker may steal the following: • Information of the client or customer • Credit card detail for unauthorized use • Passwords to access computers and networks illegally • Email password to use email account without user’s knowledge. 14
  • 15. 2. HARDWARE THEFT AND VANDALISM  Hardware theft is a process of stealing the hardware equipment such as hard disk or monitor etc. hardware vandalism is a process of defensing the hardware equipment. For example, an employee in an organization may damage keyboard or cut the wires etc. 15
  • 16. 3. SOFTWARE THEFT  Software theft means that a person can steal software media, erase software program or copy it without permission. For example, someone can steal the CD-ROM that contains the software program. 16
  • 17. 4. INFORMATION THEFT  Process of stealing personal information without permission. The stolen information can be further used for illegal activities. For example someone may steal the credit card number of another person and us it to bye things online. 17
  • 18. 5. SYSTEM FAILURE  Occurs when system do not function properly for longer time. System failure may cause further loss of data, software and hardware etc. it occurs due to many reasons such as natural disasters such as flood, fire or storm and fluctuation in power supply etc. 18
  • 19. 6. VIRUSES  A computer virus is one of the most familiar forms of risk to computer security. A virus is program that may disturb the normal working of computer. Virus attach itself to file stored on flash drive, email attachment and hard disks.  A virus can: • Damage data or software • Delete some or all files • Destroy all data by formatting hard drive • Display a false message. 19
  • 20. 7. DENIAL OF SERVICE ATTACK  It slows down a computer or network. It floods a computer or network with requests for data. The server under attack receives so many requests that it cannot respond to legitimate users. 20
  • 21. MEASURES TO PROTECT COMPUTER SECURITY 1. Disaster recovery plan: is a safety system that is used to restore the system after a complete data loss.  Use of manual system An organization can use manual system incase of disaster.  Mutual aid pact An organization can utilize manual aid pact if signal act like fire destroys the processing facility. 21
  • 22. MEASURES TO PROTECT COMPUTER SECURITY  Hot site Is a fully equipped computer center. It contains hardware, security and communication facilities etc.  Cold site Provides an environment only. An organization can install its own computer system and use in case of disaster. 22
  • 23. 2. USER RIGHTS  The users must be assigned proper rights to minimize security threats. Every authorized user should not be allowed to change or delete data. 3. Firewall  A firewall is a set combination of hardware and software that prevents unauthorized access to a network. 23
  • 24. 3. BACKUP  An addition copy of data or information stored on secondary storage media is called backup. The data stored on the system may also be lost, deleted or altered. 4. Password  Password is secret word that is used to protect a computer system or program. The user has to type the password to access the computer. The purpose of password is to protect data. 24
  • 25. 6. ENCRYPTION  Encryption is the process of encoding data so that only authorized user may understand or use it. 7. SCANNING  The data provided to the organization must be scanned before use. Proper virus scanning software should be used to scan all data. 25
  • 26. PERSONAL COMPUTERR SECURITY  Avoid extreme conditions Computer should not be placed in extreme conditions. It should be placed in an environment that is free from dust and moisture.  Avoid virus Anti virus software must be installed on computer.  Guard program and data The disks must be placed safely in lock. The backup must be stored in a safe location. 26
  • 27. BACKUP OF DATA  An additional copy of data or information stored on secondary storage media is called the backup of data. the common media of a backup are zip disk, magnetic tape, USB and hard disk etc. Purpose of backup 1. An important file can be deleted. 2. Mechanical failure in the computer may result in loss of computer data. 3. Virus may damage the data stored on the computer. 4. Computer may be stolen by any body. 5. Computer may be damaged due to fire or power failure. It is very important to take backup of data. 27
  • 28. TYPES OF BACKUP  COMPLETE BACKUP Backup of all data on hard disk is called complete backup.  INCREMENTAL BACKUP Creates a copy of only the data that is newly created or modified since the last backup this process porformed automatically in some software. 28
  • 29. MEDIA FOR DATA BACKUP  USB Flash Drive  External Hard Disk  Magnetic Tape 29
  • 30. COMPUTER VIRUS  A virus is program that may disturb the normal working of computer. Virus attach itself to file stored on flash drive, email attachment and hard disks. DAMAGED CAUSED BY VIRUS  A virus can: • Damage data or software • Delete some or all files • Destroy all data by formatting hard drive • Display a false message. 30
  • 31. CAUSES OF COMPUTER VIRUS 1. Infected flash drives 2. Email attachment 3. Insecure websites 4. Networks 5. Pirated software 31
  • 32. PROTECTION FROM VIRUS 1. The anti-virus should be installed on the computer. 2. Anti-virus software must be upgraded regularly. 3. Floppies must be scanned before use. 4. Unknown emails should not be opened. 5. Pirated software should not be installed. 32