SlideShare a Scribd company logo
 Definition
 Types
 Threats
 Antivirus
 Firewalls
 Peer Nets
Definition
• It´s the protection of
computer systems from
theft or damage to the
hardware, software or
the information on them.
Types
Threats
Antivirus
Firewalls
Peer Nets
Social Engineering
There are a lot of threats:
 Computer Crime
 Vulnerability
 Eavesdropping
 Exploits
 Trojans
 Viruses and worms
 Denial of service
 Malware
 Payloads
 Rootkits
 Keyloggers
Computer Crime
 It´s an act performed by a knowledgeable computer
user, sometimes referred to as a hacker that illegally
browses or steals a company's or individual's private
information. In some cases, this person or group of
individuals may be malicious and destroy or otherwise
corrupt the computer or data files.
 Examples:
Child Pornography, Espionage, Cyber Terrorism,etc.
For more information:
http://www.computerhope.com/jargon/c/compcrim.htm
 Would be as if a model of lock had a failure of
design that allowed us to create keys that it´s
opened. You can provide the necessary
permissions to run on a system and infect it
taking advantage of a vulnerability.
 Types:
Recognized
Strange
Have all the apps updated.
For this, is important to
have a efficient policy of
updates.
Have an advance security
solution able to detect and
block exploits.
Trojans
 It´s a program that appears to be something
safe, but it´s performing tasks such as giving
access to your computer or sending personal
information to other computers. Trojans are one
of the most common methods of criminal uses to
infect your computer and collect personal
information from your computer.
 Example:
A person obtain photos of your weekends
because your insert in your computer an USB with
a Trojan
Computer
Viruses They are small software programs that are
designed to spread from one computer to
another and to interfere with computer
operation.
They corrupt or delete data on your computer,
use your email program to spread itself to other
computers or erase everything on your hard
disk. They are spread by attachments in email
messages or instant messaging messages or
spread through downloads in Internet.
How to avoid Computer Viruses?
 Updated your computer regularly
 Have an good antivirus and updated it
regularly
COMPUTER
WORMS
 A worm is a computer program that has the ability
to copy itself from machine to machine. Worms use
up computer processing time and network
bandwidth when they replicate, and often carry
payloads that do considerable damage.
It usually exploits some sort of security hole in a
piece of software or the operating system.
Denial of
Service
 It´s a security event that occurs when an attacker
takes action that prevents legitimate users from
accessing targeted computer systems, devices or
other network resources.
It attacks typically flood servers, systems or
networks with traffic in order to overwhelm the
victim resources and make it difficult or impossible
for legitimate users to use them. While an attack
that crashes a server can often be dealt with
successfully by simply rebooting the system,
flooding attacks can be more difficult to recover
from.
 Amplified DNS DoS attack: The attacker generates crafted domain name system (DNS) requests that
appear to have originated at the victim's network and sends them to misconfigured DNS servers
managed by third parties.
 Application layer attacks: It generate fake traffic to internet application servers, especially DNS
servers or HTTP servers.
 A buffer overflow attack: It´s a catchall description most commonly applied to DoS attacks that send
more traffic to a network resource than was ever anticipated by the developers who designed the
resource.
 DDoS attack: The attacker may use computers or other network-connected devices that have been
infected by malware and made part of a botnet.
 Ping-of-death attack abuses the Packet Inter-Network Groper (ping) protocol by sending request
messages with oversized payloads, causing targeted systems to become overwhelmed, stop
responding to legitimate requests for service and possibly crashing the victim systems.
 A SYN flooding attack abuses TCP's handshake protocol by which a client establishes a TCP
connection with a server. In a SYN flooding attack, the attacker directs a high-volume stream of
requests to open TCP connections with the victim server, with no intention of actually completing the
circuits.
 Transmission Control Protocol occur when an attacker targets the state tables held in firewalls, routers
and other network devices by filling them with attack data.
 The teardrop attack exploits flaws in the way older operating systems handled fragmented Internet
Protocol packets. The IP specification allows packet fragmentation when the packets are too large to
be handled by intermediary routers, and it requires packet fragments specify fragment offsets; in
teardrop attacks, the fragment offsets are set to overlap each other.
 Volumetric DoS attacks aim to interfere with legitimate access to network resources by using up all
the bandwidth available to reach those resources. In order to do this, attackers must direct a high
volume of network traffic against the victim's systems.
How to detect a DoS
 Degradation in network performance, especially
when attempting to open files stored on the network
or accessing websites.
 Inability to reach a particular website.
 Difficulty in accessing any website.
 A higher than usual volume of spam email.
 It´s malicious software designed to
change your settings, delete software,
cause errors, watch browsing habits or
open your computer to attacks.
 Prevention Measures:
To prevent it`s compulsory to have a
antivirus like Kaspersky and a anti-
malware like Malwarebytes
Payloads
 It´s when data is sent over the Internet,
each unit transmitted includes both
header information and the actual data
being sent. The header identifies the
source and destination of the packet,
while the actual data is referred to as the
payload. Because header information, or
overhead data, is only used in the
transmission process, it is stripped from
the packet when it reaches its
destination. Therefore, the payload is the
only data received by the destination
system.
Rootkits
•A collection of software
tools that help and enable
someone to gain
unauthorized access to a
computer or other network
device. They often hide the
actions of the user.
 It´s a software program or hardware device that is used to monitor
and log each of the keys a user have into a computer keyboard. The
user who installed the program or hardware device can then view all
keys. Because these programs and hardware devices monitor the keys
typed in, a user can find user passwords and other information a user
may not want others to know. These keyloggers attach between the
keyboard and the computer.
A hardware keylogger can be connected to the back of a computer,
often without a user knowing about them, and then be disconnected
to collect all logged information.
ANTIVIRUS It´s a software utility designed to protect your computer or
network against computer viruses. If a virus is detected, the
computer displays a warning asking what action should be done,
often giving the options to remove, ignore, or move the file to the
vault.
 The best´s antivirus in order of the opinion of the users are:
Norton McAfee Trend Micro Kaspersky AVG
Classification of the users
 It´s a software utility or hardware device that acts
as a filter for data entering or leaving a network or
computer. You could think of a firewall as a security
guard that decides who enters or exits a building. A
firewall works by blocking or restricting network
ports. Firewalls are commonly used to help prevent
unauthorized access to both company and home
networks.
 2 types:
Software Firewalls
Hardware Firewalls
Software Firewalls
• They are designed to protect a computer by
blocking certain programs from sending and
receiving information from a local network or
the Internet. This photo is the symbol of
Software Firewall
 Hardware firewalls are found on most
network routers and can be configured
through the router set-up screen. This
photo is a ZyXEL ZyWALL firewall.
Peer Nets
 They are nets of information between a
central computer and other computers
connected with it.They can
communicate,distribute and share
documents,music,photos,softwares,etc.
betwwen them. This help a lot to the
hackers to share information of famous
people or modified softwares.
Types of P2P
 Centralized: They have the directory in a central server in which
the computers are connected and they request the nodes that
contain the contents.
 Descentralized and structured: They have the directory in some
computers put in places of net that make easy the access to
other computers.
 Descentralized and not structured: They don´t have anything the
function as a central controller of requests. All the nodes function
as consumers and servers.
P2P
Characteristics
 Descentralization: It handles variables connections,
temporary adresses. All the computers are equal.
 Anonymity: Users must be able to connect without
worrying about their privacy.
 Scalability: You don´t depend of a central server and
its capacities.
 Independent: The user interface does not require an
Internet browser and each computer can function as a
client or as a server.
Advantanges of P2P Programs
Cost: Most of them are free and
there are others with legal contents
that function with a subscription
but its cheap.
Eficiency: Share files using P2P
programs is fast and easy.
Legality: Some P2P programs have been
critised because they share music and
video ilegally and its punished by law in
some countries.
Spyware: Most of them are plagged of
spyware and malware. This makes your
computer slower and sometimes its stop to
function.
Some P2P Programs
 µTorrent
 eMule
 MXIE
 Morpheus
 WinMx
 Kazaa
 Vuze
 BearShare
 mIMac
More information:
http://aprenderinternet.about.com/od/Multimedia/a/Que-
Son-Los-Programas-P2p-Y-Como-Funcionan.htm
Social Engineering
 Social engineering is the use of deception and manipulation to obtain
confidential information. It´s a non-technical kind of intrusion that relies
heavily on human interaction and often involves tricking people into
breaking normal security procedures. Social engineers rely on the fact
that people are not aware of the value of the information they possess
and are careless about protecting it.
In anti virus computer security software, social engineering is generally a
hacker's clever manipulation of the natural human tendency to trust.
The hacker's goal is to obtain information that will gain him or her
unauthorized access to a system and the information that resides on
that system.
Examples:
Phishing e-mails or Pharming sites.
DEFINITION,TYPES AND THREATS:
WIKIPEDIA
COMPUTER CRIME:
FINDLAW
EXPLOITS:
WELIVESECURITY
TROJANS:
COMPUTER HOPE
COMPUTER VIRUSES:
MICROSOFT
COMPUTER WORMS:
HOWSTUFFWORKS
DENIAL OF SERVICE:
TECH TARGET
MALWARE:
COMPUTER HOPE
PAYLOADS:
COMPUTER HOPE
ROOTKITS:
COMPUTER HOPE
KEYLOGGERS:
COMPUTER HOPE
ANTIVIRUS
EBAY
FIREWALLS
COMPUTER HOPE
PEER NETS
ABOUT
SOCIAL ENGINEERING
BULL GUARD
Computing safety

More Related Content

What's hot

The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)
amar koppal
 
Network and web security
Network and web securityNetwork and web security
Network and web security
Nitesh Saitwal
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
New Horizons Bulgaria
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
Umang Gupta
 
Intruders
IntrudersIntruders
Intruders
techn
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
Manasa Deshaboina
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
Information Technology
 
Protecting your business from ddos attacks
Protecting your business from ddos attacksProtecting your business from ddos attacks
Protecting your business from ddos attacks
Saptha Wanniarachchi
 
Firewall
FirewallFirewall
Firewall
sajeena81
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
John Steensen, MBA/TM, CISA, CRISC
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
phanleson
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
Yasser Mohammed
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
Okehie Collins
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
phanleson
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
koolkampus
 
Security Threats
Security ThreatsSecurity Threats
Security Threats
Yasmeen Shaikh
 

What's hot (18)

The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Intruders
IntrudersIntruders
Intruders
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Protecting your business from ddos attacks
Protecting your business from ddos attacksProtecting your business from ddos attacks
Protecting your business from ddos attacks
 
Firewall
FirewallFirewall
Firewall
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Security Threats
Security ThreatsSecurity Threats
Security Threats
 

Similar to Computing safety

Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
Ardit Meti
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
Haider Ali Malik
 
V1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docV1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.doc
praveena06
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
maha797959
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
ryrsyd
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
Argie242424
 
Security communication
Security communicationSecurity communication
Security communication
Say Shyong
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
MuhammadRehan856177
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
MuhammadRehan856177
 
Network security
Network securityNetwork security
Network security
nafisarayhana1
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
Dhanvanthkesavan
 
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
university of mumbai
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
Ave Nawsh
 

Similar to Computing safety (20)

Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
V1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docV1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.doc
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Security communication
Security communicationSecurity communication
Security communication
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Network security
Network securityNetwork security
Network security
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
New internet security
New internet securityNew internet security
New internet security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 

Computing safety

  • 1.
  • 2.  Definition  Types  Threats  Antivirus  Firewalls  Peer Nets
  • 3. Definition • It´s the protection of computer systems from theft or damage to the hardware, software or the information on them.
  • 5. There are a lot of threats:  Computer Crime  Vulnerability  Eavesdropping  Exploits  Trojans  Viruses and worms  Denial of service  Malware  Payloads  Rootkits  Keyloggers
  • 6. Computer Crime  It´s an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individual's private information. In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.  Examples: Child Pornography, Espionage, Cyber Terrorism,etc. For more information: http://www.computerhope.com/jargon/c/compcrim.htm
  • 7.  Would be as if a model of lock had a failure of design that allowed us to create keys that it´s opened. You can provide the necessary permissions to run on a system and infect it taking advantage of a vulnerability.  Types: Recognized Strange
  • 8. Have all the apps updated. For this, is important to have a efficient policy of updates. Have an advance security solution able to detect and block exploits.
  • 9. Trojans  It´s a program that appears to be something safe, but it´s performing tasks such as giving access to your computer or sending personal information to other computers. Trojans are one of the most common methods of criminal uses to infect your computer and collect personal information from your computer.  Example: A person obtain photos of your weekends because your insert in your computer an USB with a Trojan
  • 10. Computer Viruses They are small software programs that are designed to spread from one computer to another and to interfere with computer operation. They corrupt or delete data on your computer, use your email program to spread itself to other computers or erase everything on your hard disk. They are spread by attachments in email messages or instant messaging messages or spread through downloads in Internet.
  • 11. How to avoid Computer Viruses?  Updated your computer regularly  Have an good antivirus and updated it regularly
  • 12. COMPUTER WORMS  A worm is a computer program that has the ability to copy itself from machine to machine. Worms use up computer processing time and network bandwidth when they replicate, and often carry payloads that do considerable damage. It usually exploits some sort of security hole in a piece of software or the operating system.
  • 13. Denial of Service  It´s a security event that occurs when an attacker takes action that prevents legitimate users from accessing targeted computer systems, devices or other network resources. It attacks typically flood servers, systems or networks with traffic in order to overwhelm the victim resources and make it difficult or impossible for legitimate users to use them. While an attack that crashes a server can often be dealt with successfully by simply rebooting the system, flooding attacks can be more difficult to recover from.
  • 14.  Amplified DNS DoS attack: The attacker generates crafted domain name system (DNS) requests that appear to have originated at the victim's network and sends them to misconfigured DNS servers managed by third parties.  Application layer attacks: It generate fake traffic to internet application servers, especially DNS servers or HTTP servers.  A buffer overflow attack: It´s a catchall description most commonly applied to DoS attacks that send more traffic to a network resource than was ever anticipated by the developers who designed the resource.  DDoS attack: The attacker may use computers or other network-connected devices that have been infected by malware and made part of a botnet.  Ping-of-death attack abuses the Packet Inter-Network Groper (ping) protocol by sending request messages with oversized payloads, causing targeted systems to become overwhelmed, stop responding to legitimate requests for service and possibly crashing the victim systems.  A SYN flooding attack abuses TCP's handshake protocol by which a client establishes a TCP connection with a server. In a SYN flooding attack, the attacker directs a high-volume stream of requests to open TCP connections with the victim server, with no intention of actually completing the circuits.  Transmission Control Protocol occur when an attacker targets the state tables held in firewalls, routers and other network devices by filling them with attack data.  The teardrop attack exploits flaws in the way older operating systems handled fragmented Internet Protocol packets. The IP specification allows packet fragmentation when the packets are too large to be handled by intermediary routers, and it requires packet fragments specify fragment offsets; in teardrop attacks, the fragment offsets are set to overlap each other.  Volumetric DoS attacks aim to interfere with legitimate access to network resources by using up all the bandwidth available to reach those resources. In order to do this, attackers must direct a high volume of network traffic against the victim's systems.
  • 15. How to detect a DoS  Degradation in network performance, especially when attempting to open files stored on the network or accessing websites.  Inability to reach a particular website.  Difficulty in accessing any website.  A higher than usual volume of spam email.
  • 16.  It´s malicious software designed to change your settings, delete software, cause errors, watch browsing habits or open your computer to attacks.  Prevention Measures: To prevent it`s compulsory to have a antivirus like Kaspersky and a anti- malware like Malwarebytes
  • 17. Payloads  It´s when data is sent over the Internet, each unit transmitted includes both header information and the actual data being sent. The header identifies the source and destination of the packet, while the actual data is referred to as the payload. Because header information, or overhead data, is only used in the transmission process, it is stripped from the packet when it reaches its destination. Therefore, the payload is the only data received by the destination system.
  • 18. Rootkits •A collection of software tools that help and enable someone to gain unauthorized access to a computer or other network device. They often hide the actions of the user.
  • 19.  It´s a software program or hardware device that is used to monitor and log each of the keys a user have into a computer keyboard. The user who installed the program or hardware device can then view all keys. Because these programs and hardware devices monitor the keys typed in, a user can find user passwords and other information a user may not want others to know. These keyloggers attach between the keyboard and the computer. A hardware keylogger can be connected to the back of a computer, often without a user knowing about them, and then be disconnected to collect all logged information.
  • 20. ANTIVIRUS It´s a software utility designed to protect your computer or network against computer viruses. If a virus is detected, the computer displays a warning asking what action should be done, often giving the options to remove, ignore, or move the file to the vault.  The best´s antivirus in order of the opinion of the users are: Norton McAfee Trend Micro Kaspersky AVG Classification of the users
  • 21.  It´s a software utility or hardware device that acts as a filter for data entering or leaving a network or computer. You could think of a firewall as a security guard that decides who enters or exits a building. A firewall works by blocking or restricting network ports. Firewalls are commonly used to help prevent unauthorized access to both company and home networks.  2 types: Software Firewalls Hardware Firewalls
  • 22. Software Firewalls • They are designed to protect a computer by blocking certain programs from sending and receiving information from a local network or the Internet. This photo is the symbol of Software Firewall
  • 23.  Hardware firewalls are found on most network routers and can be configured through the router set-up screen. This photo is a ZyXEL ZyWALL firewall.
  • 24. Peer Nets  They are nets of information between a central computer and other computers connected with it.They can communicate,distribute and share documents,music,photos,softwares,etc. betwwen them. This help a lot to the hackers to share information of famous people or modified softwares.
  • 25. Types of P2P  Centralized: They have the directory in a central server in which the computers are connected and they request the nodes that contain the contents.  Descentralized and structured: They have the directory in some computers put in places of net that make easy the access to other computers.  Descentralized and not structured: They don´t have anything the function as a central controller of requests. All the nodes function as consumers and servers.
  • 26. P2P Characteristics  Descentralization: It handles variables connections, temporary adresses. All the computers are equal.  Anonymity: Users must be able to connect without worrying about their privacy.  Scalability: You don´t depend of a central server and its capacities.  Independent: The user interface does not require an Internet browser and each computer can function as a client or as a server.
  • 27. Advantanges of P2P Programs Cost: Most of them are free and there are others with legal contents that function with a subscription but its cheap. Eficiency: Share files using P2P programs is fast and easy.
  • 28. Legality: Some P2P programs have been critised because they share music and video ilegally and its punished by law in some countries. Spyware: Most of them are plagged of spyware and malware. This makes your computer slower and sometimes its stop to function.
  • 29. Some P2P Programs  µTorrent  eMule  MXIE  Morpheus  WinMx  Kazaa  Vuze  BearShare  mIMac More information: http://aprenderinternet.about.com/od/Multimedia/a/Que- Son-Los-Programas-P2p-Y-Como-Funcionan.htm
  • 30. Social Engineering  Social engineering is the use of deception and manipulation to obtain confidential information. It´s a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. Social engineers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. In anti virus computer security software, social engineering is generally a hacker's clever manipulation of the natural human tendency to trust. The hacker's goal is to obtain information that will gain him or her unauthorized access to a system and the information that resides on that system. Examples: Phishing e-mails or Pharming sites.
  • 31.
  • 32. DEFINITION,TYPES AND THREATS: WIKIPEDIA COMPUTER CRIME: FINDLAW EXPLOITS: WELIVESECURITY TROJANS: COMPUTER HOPE COMPUTER VIRUSES: MICROSOFT COMPUTER WORMS: HOWSTUFFWORKS DENIAL OF SERVICE: TECH TARGET MALWARE: COMPUTER HOPE PAYLOADS: COMPUTER HOPE ROOTKITS: COMPUTER HOPE KEYLOGGERS: COMPUTER HOPE ANTIVIRUS EBAY FIREWALLS COMPUTER HOPE PEER NETS ABOUT SOCIAL ENGINEERING BULL GUARD