SlideShare a Scribd company logo
Information Security and Privacy

                Presented by:-

               Joy Chakraborty,

              Roll: 11BM91S01,

   Ph.D Scholar, 2011, VGSOM, IIT-Kharagpur



                                              1
What is a Computer Virus?
• Any program that has the ability to reproduce and attach itself to other
  programs is referred to as a computer virus.

• A virus can be designed to do various kinds of damage. It can perform a
  variety of functions ranging from annoying (e.g., popping up messages as a
  joke) to dangerous (e.g., deleting files or destroying your hard disk).

• To qualify as a virus, a program must be able to replicate (make copies of)
  itself. This can mean copying itself to different places on the same
  computer or looking for ways to reach other computers, such as by
  infecting disks or traveling across networks.

• Computer viruses, unlike biological viruses, don’t spring up out of
  nowhere—they’re created by people.


                                                                            2
How Computer viruses work?




                             3
Few Popular Types of Viruses
•   File Infector Viruses - The most “traditional” form of computer virus is the file infector virus,
    which hides within the code of another program. Before the advent of the Internet, file infector
    viruses accounted for probably 85% of all virus infections.

•   Boot Sector Viruses - Boot sector viruses reside in the part of the disk that is read into memory
    and executed when your computer first boots up. Once loaded, the virus can then infect any other
    disk used by the computer; a disk-based boot sector virus can also infect a PC’s hard disk.

•   Trojan Horses - Trojan horses are becoming more common, primarily through the spread of
    Internet-based e-mail. These e-mail Trojans spread as innocent-looking attachments to e-mail
    messages; when you click to open the attachment, you launch the virus.

•   Chat and Instant Messaging Viruses - Most chat and IM programs let you send files across to
    other users; and many users are also accustomed to accepting any files sent to them when they’re
    chatting leading to transfer of viruses.

•   E-mail viruses – E-mail viruses can be transmitted via email messages sent across private networks
    or the Internet. According to Kaspersky Lab, the research arm of the company that produces
    Kaspersky Anti-Virus software, e-mail viruses accounted for 90% of all virus attacks in 2001.

•   Worms – A worm is a program whose purpose is to duplicate itself. Worms replicate themselves
    very quickly; a network infected with a worm can be brought to its knees within a matter of hours


                                                                                                        4
Life-cycle of a computer virus




                                 5
What can a virus do?
• Copy themselves to other programs or areas of a disk.
• Replicate as rapidly and frequently as possible, filling up the infected
  system’s disks and memory, rendering the system useless.
• Display information on the screen.
• Modify, corrupt, or destroy selected files.
• Erase the contents of entire disks.
• Lie dormant for a specified time or until a given condition is met, and then
  becomes active.
• Open a “back door” to the infected system that allows someone else to
  access and even take control of the system through a network or Internet
  connection.


                                                                             6
How one can pick up a virus?
•   Receiving an infected file attached to an e-mail message, or a virus hidden
    within the message itself.

•   Viruses can even be spread through online chat rooms and instant messenger
    programs.

•   Downloading an infected file to your computer across a network, an online
    service, or the Internet.

•   Receiving an infected disk (a diskette, a CD created by someone with a CD-R
    drive, a high-capacity floppy disk and so on) from another user.

•   Copying to a disk a document file that is infected. An infected document might
    be copied from another disk or received as an attachment to an e-mail
    message.

                                                                                 7
Common virus infection symptoms
• Programs quit working or freeze up.
• Documents become inaccessible.
• Computer freezes up or won’t start properly.
• The CAPS LOCK key quits working—or works intermittently.
• Files increase in size.
• Frequent error messages appear onscreen.
• Strange messages or pictures appear onscreen.
• PC emits strange sounds.
• Friends and colleagues inform you that they’ve received strange e-mails
  from you, that you don’t remember sending.


                                                                            8
Prevention against Viruses

• Restrict your file downloading to known or secure sources

• Don’t open any e-mail attachments you weren’t expecting

• Use an up-to-date anti-virus program or service

• Create backup copies of all your important data

• Enable virus protection in all your applications

• Usage of Firewalls

                                                              9
Usage of Firewalls




• A firewall is a barrier to keep destructive forces away from your property, if one
has been using the Internet for any length of time, and especially if one works at a
larger company and browse the Web while he is at work

• Its job is similar to a physical firewall that keeps a fire from spreading from one
area to the next.

• Firewalls have helped protect computers in large companies for years. Now,
they're a critical component of home networks, as well.
                                                                                        10
Data Security issues in USA
•   Computer security in USA has received attention in recent years by reports of
    striking computer viruses and dramatic computer crimes that involve large sums of
    money.

•   The FBI uniform crime statistics do not separate computer from other sorts of
    crime.

•   Most of the incidents that are detected is not publicized because of shame, or
    because of fear of damage to the organization’s or its management’s reputation, or
    because of an agreement not to prosecute if the criminal goes away.

•   US Dollar estimates of computer crime losses are only vague estimates and range
    from $ 300 million to $ 500 billion per year. [Most of the expenses come from the
    time and effort required to locate and remove viruses, restore systems, rebuild lost
    or corrupted data, and ensure against future attacks.]

•   Protection against computer crimes is made difficult due to the multiplicity of
    targets and points of penetration.


                                                                                      11
Categories of Security Breaches
•   Computer crime cases that involve software security breaches can be classified into 4
    categories:
     Interruption
     Interception
     Modification
     Fabrication

•   In an Interruption, an asset (hardware, software, or data) of the Computer-Based
    Information System (CBIS) becomes unavailable, unusable or lost.

•   An Interception occurs when an unauthorized party has gained access to an asset.

•   Modification represents the security breach when an unauthorized party not only
    accesses but tampers with an asset.

•   Fabrication refers to introduction of counterfeit objects into a CBIS.


                                                                                            12
The Privacy Act of 1974
•    The Privacy Act of 1974 (Dec.31, 1974) states :

     No agency shall disclose any record which is contained in a system of records by any
     means of communication to any person, or to another agency, except pursuant to a
     written request by, or with the prior written consent of, the individual to whom the
     record pertains.

•    The Privacy Act mandates that each US Govt. agency have in place an administrative
     and physical security system to prevent the unauthorized release of personal records.

•    Federal agencies are subject to damages if an individual’s rights are violated.

•    There are specific exceptions allowing the use of personal records:

1.    For statistical purposes by the Census Bureau and the Bureau of Labor Statistics
2.    For routine uses within a U.S. government agency
3.    For law enforcement purposes
4.    For congressional investigations
5.    Other administrative purposes

                                                                                             13
References:-
•   “Appendix C – Computer Viruses”, Introduction to Computers by Peter Norton,
    sixth edition, McGraw Hill companies.

•   “Social and Ethical Issues in Information Systems”, (Chapter-19), Principles of
    Information Systems – A Managerial Approach, by Ralph M. Stair, Boyd and
    Fraser Publishing company.

•   Computer Security Institute (CSI), http://www.gocsi.com

•   IBM Anti-virus Research, http://www.research.ibm.com/antivirus

•   “How Firewalls work”, http://www.howstuffworks.com/firewall.htm

•   Wikipedia sources


                                                                                      14
THANK YOU



            15

More Related Content

What's hot

Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
System failure
System  failureSystem  failure
System failure
chrispaul8676
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computere
rashmi1234
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
Anna Stirling
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
PrajktaGN
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
Rahman_Hussain
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
Sonali Srivastava
 
Software theft
Software theftSoftware theft
Software theft
chrispaul8676
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
Faruk_Hossen
 
Information security
Information securityInformation security
Information security
Appin Faridabad
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
Tanveer Malik
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
swapneel07
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
FCA - Future Chartered Accountants
 
Computer security and
Computer security andComputer security and
Computer security and
Rana Usman Sattar
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
mkgspsu
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
Kaley Hair
 
Computer Security
Computer SecurityComputer Security
Computer Security
William Mann
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
 

What's hot (20)

Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
System failure
System  failureSystem  failure
System failure
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computere
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
Software theft
Software theftSoftware theft
Software theft
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Information security
Information securityInformation security
Information security
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Computer security and
Computer security andComputer security and
Computer security and
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 

Viewers also liked

Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
Vi Tính Hoàng Nam
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ganesh Vadulekar
 
Security
SecuritySecurity
Security
Sean Chia
 
Running blind Pitch
Running blind PitchRunning blind Pitch
Running blind Pitch
group044
 
Moot ct problem
Moot ct problemMoot ct problem
Moot ct problem
Alex Eliad
 
Network for Good Holiday 'Good' Guide
Network for Good Holiday 'Good' GuideNetwork for Good Holiday 'Good' Guide
Network for Good Holiday 'Good' Guide
Kate Olsen
 
De ltdh 9 2011
De ltdh 9 2011De ltdh 9 2011
De ltdh 9 2011tinhban269
 
Interview guide
Interview guideInterview guide
Interview guide
Vanessa C. Gosula
 
De ltdh 15 2011
De ltdh 15 2011De ltdh 15 2011
De ltdh 15 2011tinhban269
 
MCPS google apps for education orientation
MCPS google apps for education orientationMCPS google apps for education orientation
MCPS google apps for education orientation
Sean Patrick
 
Zuhaitz guztiak1
Zuhaitz guztiak1Zuhaitz guztiak1
Zuhaitz guztiak1Lh3zikloa
 
Course outline 2012
Course outline 2012Course outline 2012
Course outline 2012
Tuke Ingkhaninan
 
Study guide haze exercise
Study guide haze exerciseStudy guide haze exercise
Study guide haze exercise
Tuke Ingkhaninan
 
Terratrèmols
TerratrèmolsTerratrèmols
Terratrèmols
Herreros11
 
Hr planning 1.1
Hr planning 1.1Hr planning 1.1
Hr planning 1.1
Vanessa C. Gosula
 
Teaching Shapes In Math
Teaching Shapes In MathTeaching Shapes In Math
Teaching Shapes In Math
Christina Sookdeo
 
Kresge Eminent Artist 2014: Bill Rauhauser
Kresge Eminent Artist 2014: Bill RauhauserKresge Eminent Artist 2014: Bill Rauhauser
Kresge Eminent Artist 2014: Bill Rauhauser
The Kresge Foundation
 
Critique on Social Networking in Education
Critique on Social Networking in EducationCritique on Social Networking in Education
Critique on Social Networking in Education
Christina Sookdeo
 
De ltdh 4 2011
De ltdh 4 2011De ltdh 4 2011
De ltdh 4 2011tinhban269
 

Viewers also liked (20)

Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Security
SecuritySecurity
Security
 
Running blind Pitch
Running blind PitchRunning blind Pitch
Running blind Pitch
 
Moot ct problem
Moot ct problemMoot ct problem
Moot ct problem
 
Network for Good Holiday 'Good' Guide
Network for Good Holiday 'Good' GuideNetwork for Good Holiday 'Good' Guide
Network for Good Holiday 'Good' Guide
 
De ltdh 9 2011
De ltdh 9 2011De ltdh 9 2011
De ltdh 9 2011
 
Interview guide
Interview guideInterview guide
Interview guide
 
De ltdh 15 2011
De ltdh 15 2011De ltdh 15 2011
De ltdh 15 2011
 
MCPS google apps for education orientation
MCPS google apps for education orientationMCPS google apps for education orientation
MCPS google apps for education orientation
 
Zuhaitz guztiak1
Zuhaitz guztiak1Zuhaitz guztiak1
Zuhaitz guztiak1
 
Course outline 2012
Course outline 2012Course outline 2012
Course outline 2012
 
Study guide haze exercise
Study guide haze exerciseStudy guide haze exercise
Study guide haze exercise
 
Terratrèmols
TerratrèmolsTerratrèmols
Terratrèmols
 
Hr planning 1.1
Hr planning 1.1Hr planning 1.1
Hr planning 1.1
 
Teaching Shapes In Math
Teaching Shapes In MathTeaching Shapes In Math
Teaching Shapes In Math
 
Kresge Eminent Artist 2014: Bill Rauhauser
Kresge Eminent Artist 2014: Bill RauhauserKresge Eminent Artist 2014: Bill Rauhauser
Kresge Eminent Artist 2014: Bill Rauhauser
 
Critique on Social Networking in Education
Critique on Social Networking in EducationCritique on Social Networking in Education
Critique on Social Networking in Education
 
Paremvasi perioristikes endonoukleases
Paremvasi perioristikes endonoukleasesParemvasi perioristikes endonoukleases
Paremvasi perioristikes endonoukleases
 
De ltdh 4 2011
De ltdh 4 2011De ltdh 4 2011
De ltdh 4 2011
 

Similar to Information security and privacy

Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
COmPuter
COmPuterCOmPuter
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
JoelGautham
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
METU-Informatics
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
sachingwalani24
 
anti_virus
anti_virusanti_virus
anti_virus
sharq university
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Ramki M
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
Wollo UNiversity
 
COMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptxCOMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptx
T Tanujha
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
Mohd Harris Ahmad Jaal
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Computer security.pptx
Computer security.pptxComputer security.pptx
Computer security.pptx
GovandJamal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Niraj Solanke
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
nidhidgowda185
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
kiran yadav
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Small Business
 

Similar to Information security and privacy (20)

Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
COmPuter
COmPuterCOmPuter
COmPuter
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
COMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptxCOMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptx
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Computer security.pptx
Computer security.pptxComputer security.pptx
Computer security.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 

Recently uploaded

Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Information security and privacy

  • 1. Information Security and Privacy Presented by:- Joy Chakraborty, Roll: 11BM91S01, Ph.D Scholar, 2011, VGSOM, IIT-Kharagpur 1
  • 2. What is a Computer Virus? • Any program that has the ability to reproduce and attach itself to other programs is referred to as a computer virus. • A virus can be designed to do various kinds of damage. It can perform a variety of functions ranging from annoying (e.g., popping up messages as a joke) to dangerous (e.g., deleting files or destroying your hard disk). • To qualify as a virus, a program must be able to replicate (make copies of) itself. This can mean copying itself to different places on the same computer or looking for ways to reach other computers, such as by infecting disks or traveling across networks. • Computer viruses, unlike biological viruses, don’t spring up out of nowhere—they’re created by people. 2
  • 4. Few Popular Types of Viruses • File Infector Viruses - The most “traditional” form of computer virus is the file infector virus, which hides within the code of another program. Before the advent of the Internet, file infector viruses accounted for probably 85% of all virus infections. • Boot Sector Viruses - Boot sector viruses reside in the part of the disk that is read into memory and executed when your computer first boots up. Once loaded, the virus can then infect any other disk used by the computer; a disk-based boot sector virus can also infect a PC’s hard disk. • Trojan Horses - Trojan horses are becoming more common, primarily through the spread of Internet-based e-mail. These e-mail Trojans spread as innocent-looking attachments to e-mail messages; when you click to open the attachment, you launch the virus. • Chat and Instant Messaging Viruses - Most chat and IM programs let you send files across to other users; and many users are also accustomed to accepting any files sent to them when they’re chatting leading to transfer of viruses. • E-mail viruses – E-mail viruses can be transmitted via email messages sent across private networks or the Internet. According to Kaspersky Lab, the research arm of the company that produces Kaspersky Anti-Virus software, e-mail viruses accounted for 90% of all virus attacks in 2001. • Worms – A worm is a program whose purpose is to duplicate itself. Worms replicate themselves very quickly; a network infected with a worm can be brought to its knees within a matter of hours 4
  • 5. Life-cycle of a computer virus 5
  • 6. What can a virus do? • Copy themselves to other programs or areas of a disk. • Replicate as rapidly and frequently as possible, filling up the infected system’s disks and memory, rendering the system useless. • Display information on the screen. • Modify, corrupt, or destroy selected files. • Erase the contents of entire disks. • Lie dormant for a specified time or until a given condition is met, and then becomes active. • Open a “back door” to the infected system that allows someone else to access and even take control of the system through a network or Internet connection. 6
  • 7. How one can pick up a virus? • Receiving an infected file attached to an e-mail message, or a virus hidden within the message itself. • Viruses can even be spread through online chat rooms and instant messenger programs. • Downloading an infected file to your computer across a network, an online service, or the Internet. • Receiving an infected disk (a diskette, a CD created by someone with a CD-R drive, a high-capacity floppy disk and so on) from another user. • Copying to a disk a document file that is infected. An infected document might be copied from another disk or received as an attachment to an e-mail message. 7
  • 8. Common virus infection symptoms • Programs quit working or freeze up. • Documents become inaccessible. • Computer freezes up or won’t start properly. • The CAPS LOCK key quits working—or works intermittently. • Files increase in size. • Frequent error messages appear onscreen. • Strange messages or pictures appear onscreen. • PC emits strange sounds. • Friends and colleagues inform you that they’ve received strange e-mails from you, that you don’t remember sending. 8
  • 9. Prevention against Viruses • Restrict your file downloading to known or secure sources • Don’t open any e-mail attachments you weren’t expecting • Use an up-to-date anti-virus program or service • Create backup copies of all your important data • Enable virus protection in all your applications • Usage of Firewalls 9
  • 10. Usage of Firewalls • A firewall is a barrier to keep destructive forces away from your property, if one has been using the Internet for any length of time, and especially if one works at a larger company and browse the Web while he is at work • Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. • Firewalls have helped protect computers in large companies for years. Now, they're a critical component of home networks, as well. 10
  • 11. Data Security issues in USA • Computer security in USA has received attention in recent years by reports of striking computer viruses and dramatic computer crimes that involve large sums of money. • The FBI uniform crime statistics do not separate computer from other sorts of crime. • Most of the incidents that are detected is not publicized because of shame, or because of fear of damage to the organization’s or its management’s reputation, or because of an agreement not to prosecute if the criminal goes away. • US Dollar estimates of computer crime losses are only vague estimates and range from $ 300 million to $ 500 billion per year. [Most of the expenses come from the time and effort required to locate and remove viruses, restore systems, rebuild lost or corrupted data, and ensure against future attacks.] • Protection against computer crimes is made difficult due to the multiplicity of targets and points of penetration. 11
  • 12. Categories of Security Breaches • Computer crime cases that involve software security breaches can be classified into 4 categories: Interruption Interception Modification Fabrication • In an Interruption, an asset (hardware, software, or data) of the Computer-Based Information System (CBIS) becomes unavailable, unusable or lost. • An Interception occurs when an unauthorized party has gained access to an asset. • Modification represents the security breach when an unauthorized party not only accesses but tampers with an asset. • Fabrication refers to introduction of counterfeit objects into a CBIS. 12
  • 13. The Privacy Act of 1974 • The Privacy Act of 1974 (Dec.31, 1974) states : No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains. • The Privacy Act mandates that each US Govt. agency have in place an administrative and physical security system to prevent the unauthorized release of personal records. • Federal agencies are subject to damages if an individual’s rights are violated. • There are specific exceptions allowing the use of personal records: 1. For statistical purposes by the Census Bureau and the Bureau of Labor Statistics 2. For routine uses within a U.S. government agency 3. For law enforcement purposes 4. For congressional investigations 5. Other administrative purposes 13
  • 14. References:- • “Appendix C – Computer Viruses”, Introduction to Computers by Peter Norton, sixth edition, McGraw Hill companies. • “Social and Ethical Issues in Information Systems”, (Chapter-19), Principles of Information Systems – A Managerial Approach, by Ralph M. Stair, Boyd and Fraser Publishing company. • Computer Security Institute (CSI), http://www.gocsi.com • IBM Anti-virus Research, http://www.research.ibm.com/antivirus • “How Firewalls work”, http://www.howstuffworks.com/firewall.htm • Wikipedia sources 14
  • 15. THANK YOU 15