SlideShare a Scribd company logo
Computer
Security
Part 1 of 2
Small book by Shelly
Cashman that came
with text.
Top 10 Hackers Who Got Caught
Gerald Martin hacked
into the system of a
company that
competed with his. –
NY Times
Anonymous “A Leaderless Hacker Group”
Figure 10-1, pg 382
Internet and Network Attacks
Virus Worm Trojan Rootkit
Infects, negatively
altering the way
computer works
Copies itself
repeatedly, using
up resources
Needs certain
condition to trigger,
does not replicate
Allows person to
take over your
computer from
remote location.
Figure 10-2 from pg 385
Trojan
Programs, 3.
90%
Viruses, 7.00
%
Network
Worms, 89.1
0%
Malicious Program Types
http://www.securelist.com/en/analysis/151436695/Virus_Review_2002
Portable
Media, 1.3
0%
Internet, 2.
30%
Email, 93.4
0%
Main Virus Threat
Safeguards against
computer viruses and
other malware
Figure 10-5 from pg 388 of your book
Safeguards
Hardware Theft and Vandalism
Software Theft
• End-User License Agreement (EULA)
Information Theft (Encryption)
Information Theft (Digital Signature)
System Failure
Uninterruptible Power Supply (UPS)
Backing Up – The Ultimate Safeguard
Wireless Security
Wireless Access Point (WAP)
802.11i network
For Next Time
• Read the rest of the Computer Security
booklet, page 398 to the end (p. 408). Be
prepared to take home test.

More Related Content

What's hot

Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
tapan_sengupta
 
Worm
WormWorm
Network Threats
Network ThreatsNetwork Threats
Network Threats
Dan Oblak
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
Education
 
Dickmaster
DickmasterDickmaster
Dickmaster
DickMaster1
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
Emmanuel Gbenga Dada (BSc, MSc, PhD)
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Computer securety
Computer securetyComputer securety
Computer securety
rushil ahmed
 
Bcis Csm Chapter Three
Bcis Csm Chapter ThreeBcis Csm Chapter Three
Bcis Csm Chapter Three
backdoor
 
System tThreats
System tThreatsSystem tThreats
System tThreats
Sunipa Bera
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
amiyadutta
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
CAS
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 
Computer virus
Computer virusComputer virus
Computer virus
SeethaDinesh
 
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
Insiya Tarwala
 
Is Your Data Secure?
Is Your Data Secure?Is Your Data Secure?
Is Your Data Secure?
CBIZ & MHM Phoenix
 
Computer Security
Computer SecurityComputer Security
Computer Security
vishal purkuti
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
Nitish Nagar
 
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNETWHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
netmonastery
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
PrajktaGN
 

What's hot (20)

Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Worm
WormWorm
Worm
 
Network Threats
Network ThreatsNetwork Threats
Network Threats
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Bcis Csm Chapter Three
Bcis Csm Chapter ThreeBcis Csm Chapter Three
Bcis Csm Chapter Three
 
System tThreats
System tThreatsSystem tThreats
System tThreats
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
 
Is Your Data Secure?
Is Your Data Secure?Is Your Data Secure?
Is Your Data Secure?
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNETWHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 

Viewers also liked

Psalm 130
Psalm 130Psalm 130
Psalm 130
HarryKZeiders
 
1Q13 ISG Outsourcing Index, EMEA
1Q13 ISG Outsourcing Index, EMEA1Q13 ISG Outsourcing Index, EMEA
1Q13 ISG Outsourcing Index, EMEA
Information Services Group (ISG)
 
indonesia menjadi negara yang sejahtera dengan islam
indonesia menjadi negara yang sejahtera dengan islamindonesia menjadi negara yang sejahtera dengan islam
indonesia menjadi negara yang sejahtera dengan islam
Kh Azizi
 
Dc feb 2013 l.falsafi
Dc feb 2013 l.falsafiDc feb 2013 l.falsafi
Dc feb 2013 l.falsafi
leilifalsafi
 
My culture
My cultureMy culture
My culture
msubramani11097
 
CV_Sunil
CV_SunilCV_Sunil
Social media marketing strategy for linkedin
Social media marketing strategy for linkedinSocial media marketing strategy for linkedin
Social media marketing strategy for linkedin
Sourabh Rana
 
Gbpp akuntansi biaya1
Gbpp akuntansi biaya1Gbpp akuntansi biaya1
Gbpp akuntansi biaya1
Muhammad Love Kian
 
Tour-based Travel Mode Estimation based on Data Mining and Fuzzy Techniques
Tour-based Travel Mode Estimation based on Data Mining and Fuzzy TechniquesTour-based Travel Mode Estimation based on Data Mining and Fuzzy Techniques
Tour-based Travel Mode Estimation based on Data Mining and Fuzzy Techniques
SMART Infrastructure Facility
 
Blanco y Negro del Siglo XX
Blanco y Negro del Siglo XXBlanco y Negro del Siglo XX
Blanco y Negro del Siglo XX
Carlos Colomer
 
Northland journey part 1
Northland journey part 1Northland journey part 1
Northland journey part 1
chehlu
 
The "as a-Service" Phenomenon
The "as a-Service" PhenomenonThe "as a-Service" Phenomenon
The "as a-Service" Phenomenon
Information Services Group (ISG)
 
Christmas Store Slideshow
Christmas Store SlideshowChristmas Store Slideshow
Christmas Store Slideshow
acklandartmuseum
 
Year 1931 cars
Year 1931 carsYear 1931 cars
Year 1931 cars
Carlos Colomer
 
Slideshare joico
Slideshare joicoSlideshare joico
Slideshare joicoKurrnj2uu
 
Pp4
Pp4Pp4
Transcantábrico
TranscantábricoTranscantábrico
Transcantábrico
Carlos Colomer
 
Case Intruso Cauê
Case Intruso CauêCase Intruso Cauê
Case Intruso Cauê
Grupo Phocus
 

Viewers also liked (20)

mfe_our services
mfe_our servicesmfe_our services
mfe_our services
 
Onet m6 52 art
Onet m6 52  artOnet m6 52  art
Onet m6 52 art
 
Psalm 130
Psalm 130Psalm 130
Psalm 130
 
1Q13 ISG Outsourcing Index, EMEA
1Q13 ISG Outsourcing Index, EMEA1Q13 ISG Outsourcing Index, EMEA
1Q13 ISG Outsourcing Index, EMEA
 
indonesia menjadi negara yang sejahtera dengan islam
indonesia menjadi negara yang sejahtera dengan islamindonesia menjadi negara yang sejahtera dengan islam
indonesia menjadi negara yang sejahtera dengan islam
 
Dc feb 2013 l.falsafi
Dc feb 2013 l.falsafiDc feb 2013 l.falsafi
Dc feb 2013 l.falsafi
 
My culture
My cultureMy culture
My culture
 
CV_Sunil
CV_SunilCV_Sunil
CV_Sunil
 
Social media marketing strategy for linkedin
Social media marketing strategy for linkedinSocial media marketing strategy for linkedin
Social media marketing strategy for linkedin
 
Gbpp akuntansi biaya1
Gbpp akuntansi biaya1Gbpp akuntansi biaya1
Gbpp akuntansi biaya1
 
Tour-based Travel Mode Estimation based on Data Mining and Fuzzy Techniques
Tour-based Travel Mode Estimation based on Data Mining and Fuzzy TechniquesTour-based Travel Mode Estimation based on Data Mining and Fuzzy Techniques
Tour-based Travel Mode Estimation based on Data Mining and Fuzzy Techniques
 
Blanco y Negro del Siglo XX
Blanco y Negro del Siglo XXBlanco y Negro del Siglo XX
Blanco y Negro del Siglo XX
 
Northland journey part 1
Northland journey part 1Northland journey part 1
Northland journey part 1
 
The "as a-Service" Phenomenon
The "as a-Service" PhenomenonThe "as a-Service" Phenomenon
The "as a-Service" Phenomenon
 
Christmas Store Slideshow
Christmas Store SlideshowChristmas Store Slideshow
Christmas Store Slideshow
 
Year 1931 cars
Year 1931 carsYear 1931 cars
Year 1931 cars
 
Slideshare joico
Slideshare joicoSlideshare joico
Slideshare joico
 
Pp4
Pp4Pp4
Pp4
 
Transcantábrico
TranscantábricoTranscantábrico
Transcantábrico
 
Case Intruso Cauê
Case Intruso CauêCase Intruso Cauê
Case Intruso Cauê
 

Similar to Computer security

Malware
MalwareMalware
What are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdfWhat are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdf
info309708
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
aravindanvaithilinga
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Ashish Sharma
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
Mar Soriano
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 
Presentation
PresentationPresentation
Presentation
Nishant Barot
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats
mohamad Hamizi
 
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
anjanaarts2014
 
Digital Security Risk.pptx
Digital Security Risk.pptxDigital Security Risk.pptx
Digital Security Risk.pptx
AdrianVANTOPINA
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
NamanKikani
 
What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computer
lmadison10
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
Souman Guha
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
windows21
 
computer security
computer securitycomputer security
computer security
Azhar Akhtar
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
SeniorGaming
 
Computer security
Computer securityComputer security
Computer security
sruthiKrishnaG
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
arnoldmeredith47041
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
SecurityTube.Net
 

Similar to Computer security (20)

Malware
MalwareMalware
Malware
 
What are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdfWhat are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdf
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Presentation
PresentationPresentation
Presentation
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats
 
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
 
Digital Security Risk.pptx
Digital Security Risk.pptxDigital Security Risk.pptx
Digital Security Risk.pptx
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computer
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
computer security
computer securitycomputer security
computer security
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Computer security
Computer securityComputer security
Computer security
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 

More from Carolyn Brockman

Introduction to Technology
Introduction to TechnologyIntroduction to Technology
Introduction to Technology
Carolyn Brockman
 
Tlc 023 syllabus su14 brockman
Tlc 023 syllabus su14 brockmanTlc 023 syllabus su14 brockman
Tlc 023 syllabus su14 brockman
Carolyn Brockman
 
Edu 225 102 syllabus spring 2014 brockman v2
Edu 225 102 syllabus spring 2014 brockman v2Edu 225 102 syllabus spring 2014 brockman v2
Edu 225 102 syllabus spring 2014 brockman v2
Carolyn Brockman
 
Edu 225 102 syllabus spring 2014 brockman
Edu 225 102 syllabus spring 2014 brockmanEdu 225 102 syllabus spring 2014 brockman
Edu 225 102 syllabus spring 2014 brockman
Carolyn Brockman
 
Tth tentative class schedule sp14
Tth tentative class schedule sp14Tth tentative class schedule sp14
Tth tentative class schedule sp14
Carolyn Brockman
 
Mw tentative class schedule sp14
Mw tentative class schedule sp14Mw tentative class schedule sp14
Mw tentative class schedule sp14
Carolyn Brockman
 
Tlc 023 105 syllabus sp14 brockman
Tlc 023 105 syllabus sp14   brockmanTlc 023 105 syllabus sp14   brockman
Tlc 023 105 syllabus sp14 brockman
Carolyn Brockman
 
Tlc 023 102 syllabus sp14 brockman
Tlc 023 102 syllabus sp14   brockmanTlc 023 102 syllabus sp14   brockman
Tlc 023 102 syllabus sp14 brockman
Carolyn Brockman
 
06 listening and note taking
06 listening and note taking 06 listening and note taking
06 listening and note taking
Carolyn Brockman
 
Lesson plan ppt
Lesson plan pptLesson plan ppt
Lesson plan ppt
Carolyn Brockman
 
Blog vs podcast
Blog vs podcastBlog vs podcast
Blog vs podcast
Carolyn Brockman
 
Memory games can help
Memory games can helpMemory games can help
Memory games can help
Carolyn Brockman
 

More from Carolyn Brockman (12)

Introduction to Technology
Introduction to TechnologyIntroduction to Technology
Introduction to Technology
 
Tlc 023 syllabus su14 brockman
Tlc 023 syllabus su14 brockmanTlc 023 syllabus su14 brockman
Tlc 023 syllabus su14 brockman
 
Edu 225 102 syllabus spring 2014 brockman v2
Edu 225 102 syllabus spring 2014 brockman v2Edu 225 102 syllabus spring 2014 brockman v2
Edu 225 102 syllabus spring 2014 brockman v2
 
Edu 225 102 syllabus spring 2014 brockman
Edu 225 102 syllabus spring 2014 brockmanEdu 225 102 syllabus spring 2014 brockman
Edu 225 102 syllabus spring 2014 brockman
 
Tth tentative class schedule sp14
Tth tentative class schedule sp14Tth tentative class schedule sp14
Tth tentative class schedule sp14
 
Mw tentative class schedule sp14
Mw tentative class schedule sp14Mw tentative class schedule sp14
Mw tentative class schedule sp14
 
Tlc 023 105 syllabus sp14 brockman
Tlc 023 105 syllabus sp14   brockmanTlc 023 105 syllabus sp14   brockman
Tlc 023 105 syllabus sp14 brockman
 
Tlc 023 102 syllabus sp14 brockman
Tlc 023 102 syllabus sp14   brockmanTlc 023 102 syllabus sp14   brockman
Tlc 023 102 syllabus sp14 brockman
 
06 listening and note taking
06 listening and note taking 06 listening and note taking
06 listening and note taking
 
Lesson plan ppt
Lesson plan pptLesson plan ppt
Lesson plan ppt
 
Blog vs podcast
Blog vs podcastBlog vs podcast
Blog vs podcast
 
Memory games can help
Memory games can helpMemory games can help
Memory games can help
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Computer security

Editor's Notes

  1. “Computer Security Risk” is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.Cybercrime is one of FBI’s Top 3 priorities.Hacker, originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally. Some hackers claim the intent of their security breaches is to improve security.Cracker also is someone who accesses a computer or nework illegally but has the intent of destroying data, stealing information, or other malicious action. Both hackers and crackers have advanced and network skills.Script kiddie same intent as a cracker but does not have the technical skills and knowledge. Script kiddies use prewrittten hacking and cracking programs to break into computers.
  2. Unethical employees break into their employers’ computers for a variety of reasons. Some simply want to explois a security weakness. Others seek financial gains from selling confidential information. Disgruntled employees may want revenge.Cyberextortionists is someone who uses em-mail as a vehicle for extortion. These perpetrators send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network – if they are not paid a sum of money.Cyberterroists-some
  3. Cyberterroists-someone who uses the Internet or network to destroy or damage computers for political reasonss. The cyberterrorist might target the nation’s air traffic control system, electricity-generating companies, or a telecommunications infrastructure. Cyberterrorismusuuallyreuires a team of highly skilled individuals, millions of dollars, and several years of planning.Anonymous: Leaderless Hacker Group
  4. Computer viruses, worms, Trojan Horses and Rootkits virus- potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. Once the virus infects the computer, it can spread throughout and may damage files and system software, including the operating system. worm; program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network Trojan horse a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the Trojan horse. Unlike a virus or a worm, A Trojan horse does not replicate itself to other computers. rootkit- a program that hides in a computer an allows someone from a remote location to take full control of the computer. Once the rootkit is installed, the rootkit author can execute programs, change settings, monitor activity, and access files on the remote computerMalwarePayloadoperating system runs much slower than usualAvailable memory is less than expectedFiles become corruptedScreen displays unusual message or imageUnknown programs or files mysteriously appearMusic or unusual sound plas randomlyEisting programs and files disappearPrograms or files do not work properlySstem properties changeOperating system does not start upOperating system shutds down unexpectedly
  5. More than 300,000 computer Web sites can infect your computer.Open an infected fileRuns an infected programBoots the computer with an infected removable media inserted in a drive or plugged into a portConnects an unprotected computer to a networkWhen a certain condition or event occurs such as computer’s clock changing to a specific date.A common way computer an become infected is through email.
  6. Interesting Information, according to Securelist.com, a virus review for 2002, http://www.securelist.com/en/analysis/151436695/Virus_Review_2002 Two graphs stood out.Malicious Program Types Trojan Programs 3.9%, Viruses 7.0%, and Network Worms 89.1%AndMain Virus Threat Sources Portable Media 1.30%, Internet 2.30%, Email 96.40%
  7. Anti virus programVirus signatureVirus definitionTips for preventing viruses and other malware. trusted sourceantivirus programsVirus signatureVirus definition- known specific code of virus codeQuarintine- a separate area of a hard disk that holds the infected file until the infection can be removed.Refer to TIPS for PREVENTING VIRUSES AND OTHER MALWARE
  8. Botnets- a group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes. A compromised computers, known as a zombie, is one whose owner is unaware the computer is being controlled remotely by an outsider. Cybercriminals use botnets to send spam via e-mail, spread viruses and other malware, or commit a denial of service attack.Denial of Service Attacks- disrupt computer access to an internet services such as the Web or emailBack Doors bypass security controlsSpoofing appear legitimate to a vitim or a network
  9. Safeguards against Botnets, DoS Attacks, Back Doors and SpoofingFirewallsIntrusion Detection software
  10. Safeguards against unauthorized access and useIdentifying and authenticating usersUser names and passwordsPossessed objects- any object you must carry to gain acess to a computer or comuter facility, badges, cards, smart cards, and keysBiometric devicesDigital Forensics
  11. Safeguards Against Hardware Theft and Vandalism
  12. Safeguards Against Software TheftLockup copies of your CDs
  13. Safeguards against Information TheftEncryptionDigital signature
  14. Safeguards against system failureAmount of protection to power strip is “proportiona to cost” the more expensive the more protection.Be sure to have protection for your modem, telephone lines, DSL lines, Internet cable lines and network lines.
  15. Backing upBack upRestore
  16. Wireless Access Point (WAP) should be configured so tha tit does not broadcast a netowrk name. configured so that certain devices can access it.
  17. Wi-Fi Protected Access (WPA)- security standard that imiproves on older security standards by authenticating network users and providing more advanced encryptions tehnicques.
  18. 802.11i network, sometimes called WPA2, the most recent network security standard, conforms to the governments security standards and uses ore sophisticated encryption techniques than WPA.Way beyond me!