SlideShare a Scribd company logo
COMPUTER SECURITY & COPYRIGHT 1
Introduction to
ComputingCOMPUTER SECURITY & COPYRIGHT 2
BY:
Eliza Batool
COMPUTER SECURITY & COPYRIGHT 3
COMPUTER SECURITY & COPYRIGHT 4
COMPUTER SECURITY & COPYRIGHT 5
◊Computer & Data Security.
◊Computer Crime.
◊Types of Computer Crime.
◊Security Threats.
◊Intentional & Unintentional Threats.
◊Controlling Intentional & Unintentional
Threats.
◊Privacy & Data Protection.
◊Computer Viruses.
◊Types of Viruses
◊Copyright.
◊Site License COMPUTER SECURITY & COPYRIGHT 6
COMPUTER SYSTEM
COMPUTER SECURITY & COPYRIGHT 7
COMPUTER SECURITY & COPYRIGHT 8
•Intentional Threats.
•Unintentional Threats.
COMPUTER SECURITY & COPYRIGHT 9
How threats prevail??
COMPUTER SECURITY & COPYRIGHT
10
CONTROLLING
UNINTENTIONAL
THREATS
COMPUTER SECURITY & COPYRIGHT11
METHODS / TECHNIQUES
1. Backup of Data
2. UPS & Voltage Stabilizer.
3. Personal Computer Care.
4. Precautions During installation of
Computer.
5. Properly Shutdown the Computer.
COMPUTER SECURITY & COPYRIGHT12
1. BACKUP OF DATA
 Definition.
 Types.
COMPUTER SECURITY & COPYRIGHT13
Types of Backup
Complete Backup.
 Incremental Backup.
COMPUTER SECURITY & COPYRIGHT14
2. UPS STABILIZER
AND
VOLTAGE STABILIZER
COMPUTER SECURITY & COPYRIGHT15
3. PERSONAL COMPUTER CARE
METHODS:
Keep the computer in cool place.
Do not open the computer case and
monitor.
Provide dust and moisture free
environment.
COMPUTER SECURITY & COPYRIGHT16
4. PRECAUTIONS DURING
INSTALLATION OF COMPILER
Provide good, clean electricity connection and
plugs.
Do not overload a power point and a potential
fire hazard.
Networking cables should not be meshed up.
COMPUTER SECURITY & COPYRIGHT17
5. PROPERLY SHUTDOWN
THE COMPUTER
Process of shutting down.
Effect of sudden power switch off.
COMPUTER SECURITY & COPYRIGHT18
CONTROLLING
INTENTIONAL
THREATS
COMPUTER SECURITY & COPYRIGHT19
 Users Rights
 Password
 Encryption
 Authentication Schemes
METHODS / TECHNIQUES
COMPUTER SECURITY & COPYRIGHT20
USER RIGHTS
The authorized user have rights to
access, delete & modify data.
Another user can change data but
cannot add new data.
COMPUTER SECURITY & COPYRIGHT21
TYPES
There are two types of user rights
 Privileges.
 Log on rights.
COMPUTER SECURITY & COPYRIGHT22
PASSWORD
Definition.
Why applied??
Authorized Persons.
Composition.
Examples.
Precautions.
COMPUTER SECURITY & COPYRIGHT23
ENCRYPTION
Definition.
 Advantage.
Example.
COMPUTER SECURITY & COPYRIGHT24
BIOMETRIC AUTHENTICATION
SCHEMES
Why used??
Composition.
How they are implemented??
Why Smart cards are used??
Advantage.
COMPUTER SECURITY & COPYRIGHT25
COMPUTER
VIRUSES
COMPUTER SECURITY & COPYRIGHT26
Definition:
A computer virus is a program, a
block of executable code, which
attach itself to, overwrite or
otherwise replace another
program in order to reproduce
itself without a knowledge of a PC
user.
COMPUTER SECURITY & COPYRIGHT27
Types Of Viruses
Different types of viruses are:
1. Boot sector viruses
2. Parasitic viruses
3. Multi-partite viruses
4. Companion viruses
5. Link viruses
COMPUTER SECURITY & COPYRIGHT28
Disadvantages Of Viruses
 Loss of software functionality.
 Exploitation.
 Damages files.
 Causes security problems.
 Corrupt files.
 Hack files.
 Instability in performance.
 Damage hardware (Hard disk etc)
 Effect the speed.
COMPUTER SECURITY & COPYRIGHT29
HOW VIRUS SPREAD
OUT ALL AROUND
THE WORLD??
COMPUTER SECURITY & COPYRIGHT30
COMPUTER SECURITY & COPYRIGHT31
COMPUTER SECURITY & COPYRIGHT32
How To Overcome?
 Make backups on a regular basis.
 Ready to reinstall your system if damaged by a virus.
 Protect your network connection with a firewall.
 Use antivirus software.
 Regularly update your operating system.
 Do not install and run software suspicious.
 Restrict access to your computer.
 If you’re using internet explorer , try to use another
browser
 Use spam protection.
COMPUTER SECURITY & COPYRIGHT33
COPY RIGHT
COMPUTER SECURITY & COPYRIGHT34
Introduction:
 What is Copy Right?
 What kind of protection it gives?
 Types of Copyrights.
 Importance of Copyrights.
COMPUTER SECURITY & COPYRIGHT35
Types of Copy Rights:
Software Copyright:
Law of using software.
It’s a license. If it is not copyrighted,
then the software is illegal to use.
COMPUTER SECURITY & COPYRIGHT36
COPYRIGHT ACT:
Copyright Act 1976:
Main Law controlling software piracy.
Intellectual property of company.
Amendments were made
COMPUTER SECURITY & COPYRIGHT37
SITE LICENSE:
It is the permission to use a software
on fixed number of computers.
It is beneficial in large organizations.
It takes lesser cost.
COMPUTER SECURITY & COPYRIGHT38
FREEWARE & SHAREWARE:
Intro to “Free Ware”.
Why free wares are developed?.
Intro to “Share Ware”.
Use of Share ware and its illegal use.
COMPUTER SECURITY & COPYRIGHT39
REFERENCES
 P.M Series Introduction to Information Technology
By:
C.M.Aslam, Dr.Safia Iftikhar, Iftikhar Ahmed and Hafiz
Saeed Ahmed. Edition 2012 revised Page no. 405 to
424.
 http://www.webopedia.com/TERM/S/site_license.html
 http://www.google.com/search?hl=en&client=firefox-
a&tbo=d&rls=org.mozilla%3Aen-
US%3Aofficial&channel=np&biw=1024&bih=629&tbm=i
sch&sa=1&q=computer+intentional+threat&oq=comput
er+intentional+threat&gs_l=img.3...113845.116803.0.1
17369.12.12.0.0.0.0.328.1903.4j5j0j3.12.0.crnk_timedi
scounta..0.0...1c.1.sgEvBykWuTE
 blink.ucsd.edu/technology/help-
desk/policies/copyright.html
COMPUTER SECURITY & COPYRIGHT40
THAT’S ALL
COMPUTER SECURITY & COPYRIGHT
41
THANKYOU
COMPUTER SECURITY & COPYRIGHT42

More Related Content

What's hot

Persentation
PersentationPersentation
Persentation
Mehar Tayyab
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
Mukesh Chinta
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
CH Asim Zubair
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
Edureka!
 
Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015
Cybernetic Global Intelligence
 
Masters in cyber security
Masters in cyber securityMasters in cyber security
Masters in cyber security
VihaanBajaj
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
imtnoida112
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes
 
Cyber security
Cyber securityCyber security
Cyber security
RavikantGautam8
 
Cyber security
Cyber securityCyber security
Cyber security
abithajayavel
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
Sam Bowne
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
karanramani4
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
презентация1
презентация1презентация1
презентация1
sagidullaa01
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ankit Ranjan
 
Cyber security
Cyber securityCyber security
Cyber security
Prem Raval
 
Network security
Network securityNetwork security
Network security
Eshrak Rahman
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
ShafeeqaFarsana
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
Mukesh Chinta
 

What's hot (20)

Persentation
PersentationPersentation
Persentation
 
cyber security
cyber securitycyber security
cyber security
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015
 
Masters in cyber security
Masters in cyber securityMasters in cyber security
Masters in cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
презентация1
презентация1презентация1
презентация1
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 

Similar to computing

Cyber Security
Cyber SecurityCyber Security
Cyber Security
Arshad Khan
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014
Tutun Juhana
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
Dr. Hemant Kumar Singh
 
Computer security
Computer securityComputer security
Computer security
Ayesha Arshad
 
Week 13 ch14 c
Week 13 ch14 cWeek 13 ch14 c
Week 13 ch14 cZahir Reza
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
ehadjasd
ehadjasdehadjasd
Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer security
ShouaQureshi
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
ryrsyd
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
WilsonWanjohi5
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
rizwanshafique4321
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
22-NTU-BA-1784.pptx
22-NTU-BA-1784.pptx22-NTU-BA-1784.pptx
22-NTU-BA-1784.pptx
MuhammadZeeshanAnwar5
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionmonroel
 

Similar to computing (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Computer security
Computer securityComputer security
Computer security
 
Week 13 ch14 c
Week 13 ch14 cWeek 13 ch14 c
Week 13 ch14 c
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
ehadjasd
ehadjasdehadjasd
ehadjasd
 
Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Data security
Data securityData security
Data security
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
needforsecurity
needforsecurityneedforsecurity
needforsecurity
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
 
Notacd02
Notacd02Notacd02
Notacd02
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
22-NTU-BA-1784.pptx
22-NTU-BA-1784.pptx22-NTU-BA-1784.pptx
22-NTU-BA-1784.pptx
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 

computing

Editor's Notes

  1. COMPUTER SECURITY & COPYRIGHT