SlideShare a Scribd company logo
Heriot-Watt University  Tutor: Josie Pilcher  Date: 07/06/2006 Home Computer Security  By: Mohammed A. Wahig Al-Sahli
Home Computer Security  Heriot-Watt University  ,[object Object]
  Computer Security Risk Management
  Home Computer Network and the Internet
Network Connection Requirements
Computer Ports and Address
  Common Security Threats against Home Computer
  Protecting Home Computer
the Main steps to Protect Home Computer Data
 Conclusions ,[object Object]
Home Computer Security  Heriot-Watt University  Home Computer Data is at Risk ,[object Object]
There are a growing number of sources that can put home computer data at risk (Nash, 2004).
WindowsXP is the most popular operating system for home computers according to W3 School Web Site although “Windows XP, the most insecure computer operating system ever invented” (Walker, 2005, P1).,[object Object]
Home Computer Security  Heriot-Watt University  Home Computer Data is at Risk Malicious Code (2004/2005)-LinuxBy Kaspersky Web Site
Home Computer Security  Confidentiality Heriot-Watt University  Integrity Availability Computer Security Risk Management ,[object Object],This term is referred to as C-I-A triad
Home Computer Security  Heriot-Watt University  Computer Security Risk Management ,[object Object],the Computer Security Risk Management
Home Computer Security  Heriot-Watt University  Home Computer Network and the Internet ,[object Object]

More Related Content

What's hot

Computer security overview
Computer security overviewComputer security overview
Computer security overview
CAS
 
Information security threats
Information security threatsInformation security threats
Information security threats
complianceonline123
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
Al Balqa Applied University
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of securitySejahtera Affif
 
Computer security
Computer securityComputer security
Computer security
OZ Assignment help
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
Anna Stirling
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
Dr. B T Sampath Kumar
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
arun alfie
 

What's hot (20)

Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Network Security
Network SecurityNetwork Security
Network Security
 
R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Yadav 1(2)
Yadav 1(2)Yadav 1(2)
Yadav 1(2)
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Computer security
Computer securityComputer security
Computer security
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 

Similar to Home Computer Security Presentation 1 Of 2

Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
ijsrd.com
 
Windows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITProsWindows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITPros
Juan Ignacio Oller Aznar
 
Information security
Information securityInformation security
Information security
Appin Faridabad
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
Khristine Botin
 
What are the essential outcomes of secure system retirement- Justify y.docx
What are the essential outcomes of secure system retirement- Justify y.docxWhat are the essential outcomes of secure system retirement- Justify y.docx
What are the essential outcomes of secure system retirement- Justify y.docx
loisj1
 
Cyber security
Cyber securityCyber security
Cyber security
Nimesh Gajjar
 
computer security
computer securitycomputer security
computer security
Azhar Akhtar
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protectionphanleson
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Network management and security
Network management and securityNetwork management and security
Network management and security
Ankit Bhandari
 
Slideshare is
Slideshare isSlideshare is
Slideshare is
Ashu Pandita Kaul
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Sabiha M
 

Similar to Home Computer Security Presentation 1 Of 2 (20)

Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Windows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITProsWindows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITPros
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Information security
Information securityInformation security
Information security
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
What are the essential outcomes of secure system retirement- Justify y.docx
What are the essential outcomes of secure system retirement- Justify y.docxWhat are the essential outcomes of secure system retirement- Justify y.docx
What are the essential outcomes of secure system retirement- Justify y.docx
 
C3
C3C3
C3
 
Cyber security
Cyber securityCyber security
Cyber security
 
Forensics
ForensicsForensics
Forensics
 
computer security
computer securitycomputer security
computer security
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Data security
Data securityData security
Data security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Slideshare is
Slideshare isSlideshare is
Slideshare is
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Home Computer Security Presentation 1 Of 2