Desktop Secutity
“We live in a world that has walls and
those walls need to be guarded by men
with guns”.
Presented by
Aanuradha Sharma
Akshata Mahajan
Hardik Bhandari
Navin Prajapati
Sunal Gupta
TABLE OF CONTENTS
04
01
02About computers Attack
Desktop Defence
Summary
Objectives 03
Objective
•To Find types of Software and Hardware attack.
•To find how to recover from attack.
Attack on Computers
Attack on Hardware
Malicious Software
attack
Malicious Software
Attack
•Malware
•Primary Objective of Malware
•Infecting Malware
Attack on
Hardware
BIOS
USB Device
Cell Phone
Physical Theft of Laptop Computers and Information
USB Device
USB (Universal Serial Bus)
Small, Lightweight, Removable, and
contain rewritable storage
Common types MP3
Cell Phones
Portable communication Device
Wireless Devices
Types of Attack
Lure users to malicious Web Sites
Launch attack on another Phones
Access amount of Information
Abuse the cell phone service
Physical Theft
Portable Laptop computers are particularly
Venerable to theft.
Data can be retrieved from a hard drive by an
attacker even after its file has been deleted.
Desktop Defence
Defences Include
Managing patches
Installing antivirus software
Using buffer overflow protection
Protecting theft
Creating data backups
Even a cassette backup is better then no
backup
Antivirus Software
•Scan a computer’s hard drive for infections
•Monitoring computer activity
•Examine all new documents that might
contain a virus
•Drawback of AV software:
•- Must be continuously updated to
recognize to new viruses
Protecting Against
Theft
Applies to loptops especially
Device Lock
Software tarcking system
Copying data from a computer hard drive onto other digital
media
Sophisticaticated hardware and software can backup data
on a regular Schedule
Personal computers users
Operating system functions
Third party software
Creating a data backup
Basic steps to perform
Disconnect
Identify
Disinfect
Recheck
Reinstall
Analyze
Recovering from Attack
Summary
Never trust a walrus
Mallicious software (Malware)
Enters a computer system without the owner’s knowledge or consent
Hardware is also the target of attackers
Tactis for defending desktop systems
Basic steps to disinfect and restore a computer.
THANK-YOU
Aanuradha Sharma
Akshata Mahajan
Hardik Bhandari
Navin Prajapati
Sunal Gupta

Desktop Security