SlideShare a Scribd company logo
COMPUTER & DATA SECURITY
Introduction to Computing
CHAPTER #
11
Introduction to Computing 2Chapter # 11
Security
 Security is about the protection of assets
 It can be computer, network or data security
 Security is a set of procedures that protect
 You, your employees, and your peers
 Paper or electronic media
 Hardware, software, and networks
 It protects from damage, theft, or change
 There can be different security measures
 Prevention
 measures taken to protect your assets from being damaged
 Detection
 measures taken to allow you to detect when an asset has been damaged,
how it was damaged and who damaged it
 Reaction
 measures that allow you to recover your assets
Introduction to Computing 3Chapter # 11
Computer Security
 Computer security is information security as applied to
computers and networks
 The field covers all the processes and mechanisms by which
computer-based equipment, information, networks and
services are protected from unintended or unauthorized
access, change or destruction
 It also includes protection from unplanned events and natural
disasters
Introduction to Computing 4Chapter # 11
Security Properties
 Confidentiality
 ensures that the data is only read by the intended recipients
 Integrity
 ensures that all of the data has not been corrupted from its
original source
 The system continues to operate properly.
 Availability
 Actions by an attacker do not prevent users from having access
to use of the system
 guarantees that the data is usable upon demand
 Accountability
 it is audit information that is kept and protected so that security
actions can be traced to the responsible party
Introduction to Computing 5Chapter # 11
Highly Vulnerable
 Financial institutions and banks
 Internet service providers
 Government and defense agencies
 Multinational corporations
 Pharmaceutical companies
 Contractors to various government agencies
 Anyone on the Internet
Introduction to Computing 6Chapter # 11
Types of Attacks
 Denial of Service (D.o.S) attacks
 D.o.S attacks have one goal – to knock your service off the net
 Crash your host
 Flood your host
 Flood the network connecting to your host
 Viruses
 A computer virus attaches itself to files on the target machine
 Master Boot Sector/Boot Sector viruses
 File viruses, Macro viruses
 Stealth viruses, Polymorphic viruses
Introduction to Computing 7Chapter # 11
Types of Attacks
 Trojans
 Trojans are programs that appear to perform a desirable and necessary
function that perform functions unknown to (and probably unwanted
by) the user
 Worms
 Worms are memory resident viruses
 Unlike a virus, which seeds itself in the computer's hard disk or file system,
a worm will only maintain a functional copy of itself in active memory
 Worms frequently “sleep” until some event triggers their activity
 e.g. send password file to hacker, send copy of registry to hacker
 Worms and Trojans are frequent methods by which Backdoors are
enabled on a system
 Backdoors
 Such programs give remote access to the computer from anywhere on
the Internet
 e.g. Back Orifice, BO2K, Sub-Seven)
Introduction to Computing 8Chapter # 11
Types of Attacks
 Sniffers
 Devices that capture network packets
 Extremely difficult to detect because they are passive
 Scanners
 Programs that automatically detect security weaknesses in remote or local
hosts
 Tells the hacker
 What services are currently running
 What users own those services
 Whether anonymous logins are supported
 Whether certain network services require authentication
 Password Crackers
 Some actually try to decrypt
 Most simply try “brute force” or intelligent “brute force”
 Dictionary words, days of year, initials
Introduction to Computing 9Chapter # 11
Types of Attacks
 Social Engineering
 “This is MIS, I can fix your e-mail box, what’s your password?”
 Email Spoofing
 It tricks the user in believing that the email originated from a certain
user such as an administrator although it actually originated from a
hacker
 Such emails may solicit personal information such as credit card details
and passwords
 Examining the email header may provide some additional information
about the origin of the email
Introduction to Computing 10Chapter # 11
How Do We Protect
 Anti-virus software
 Personal Anti-virus SW on your machine
 Make sure it is set to scan all executables, compressed files,
e-mail, e-mail attachments, web pages
 Keep your virus information files up to date!!!
 Firewalls
 A combination of hardware and software resources positioned
between the local (trusted) network and [an untrusted network]
 It ensures that all communication between an organization's network
and the Internet connection conforms to the organization's security
policy
 It tracks and controls communications, deciding whether to pass,
reject, encrypt, or log communications
Introduction to Computing 11Chapter # 11
Cryptography
 Cryptography is the practice and study of techniques for secure
communication in the presence of third parties
 Modern cryptography intersects the disciplines of mathematics, computer
science, and electrical engineering
 Applications of cryptography include ATM cards, computer passwords,
and electronic commerce
 Simply – secret codes
 Encryption
 Converting data to unreadable codes to prevent anyone form accessing this
information
 Need a “key” to find the original data
 keys take a few million-trillion years to guess
 Public keys
 An ingenious system of proving you know your password without disclosing your
password. Also used for digital signatures
 Used heavily in SSL connections
 Hashing
 Creating fingerprints of documents
Introduction to Computing 12Chapter # 11
Cryptography
Symmetric encryption
Authentication
Asymmetric encryption
Public Key Infrastructure
Introduction to Computing 13Chapter # 11
Steganography
 Steganography is the art and science of writing hidden
messages in such a way that no one, apart from the sender
and intended recipient, suspects the existence of the
message
 It is a form of security through obscurity
 Message appears to be something else
 images, articles, shopping lists, or some other cover-text
 Classically, the hidden message may be in invisible ink
between the visible lines of a private letter
 Messages do not attract attention to themselves
 It is high security technique for long data transmission
Introduction to Computing 14Chapter # 11
Watermarking
 Watermarking is the process of hiding digital information in a
carrier signal
 It is a technique in which a kind of marker is embedded in a
signal such as audio or image data
 Used to identify ownership of the copyright of such signal
 Digital watermarks may be used to verify the authenticity or
integrity of the carrier signal or to show the identity of its
owners
 It is prominently used for tracing copyright infringements and
for banknote authentication

More Related Content

What's hot

02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
Joe McCarthy
 
Network security
Network securityNetwork security
Network security
Nkosinathi Lungu
 
Network security
Network securityNetwork security
Network security
Ali Kamil
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
nathanurag
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
osama elfar
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
AfreenYousaf
 
Internet Security
Internet SecurityInternet Security
Internet Security
JainamParikh3
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Fat-Thing Gabriel-Culley
 
Network Security
Network Security Network Security
Network Security
Abdul Qadir Pattal
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
 
keamanan komputer / computer security
keamanan komputer / computer securitykeamanan komputer / computer security
keamanan komputer / computer security
Hendra Fillan
 
Network Security
Network SecurityNetwork Security
Network Security
Jaya sudha
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 
Chapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs RansomwareChapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs Ransomware
Adi Saputra
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
Atif Rehmat
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
ShafeeqaFarsana
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
veeresh35
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
toamma
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
waqasahmad1995
 

What's hot (20)

02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network Security
Network Security Network Security
Network Security
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
keamanan komputer / computer security
keamanan komputer / computer securitykeamanan komputer / computer security
keamanan komputer / computer security
 
Network Security
Network SecurityNetwork Security
Network Security
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Chapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs RansomwareChapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs Ransomware
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 

Similar to Itc chapter # 11

cybersecurity
cybersecuritycybersecurity
cybersecurity
maha797959
 
Computer security and
Computer security andComputer security and
Computer security and
Rana Usman Sattar
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Data security
Data securityData security
Data security
Soumen Mondal
 
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
university of mumbai
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
ryrsyd
 
internet security
internet securityinternet security
internet security
Jorige Venkatapraveen
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
Haider Ali Malik
 
Internet security
Internet securityInternet security
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
Ardit Meti
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsCybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Samuel862293
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
Michael Noel
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
DebmalyaSingha
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
babepa2317
 

Similar to Itc chapter # 11 (20)

cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Computer security and
Computer security andComputer security and
Computer security and
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Data security
Data securityData security
Data security
 
New internet security
New internet securityNew internet security
New internet security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
internet security
internet securityinternet security
internet security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Internet security
Internet securityInternet security
Internet security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsCybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 

More from National university of modern languages

Heart land Theory
Heart land TheoryHeart land Theory
Science and technology in society
Science and technology in societyScience and technology in society
Science and technology in society
National university of modern languages
 
Germanys way to_democracy
Germanys way to_democracyGermanys way to_democracy
Germanys way to_democracy
National university of modern languages
 
Terrorism in Pakistan
Terrorism in PakistanTerrorism in Pakistan
Internal and external_security_threats_to_pakistan
Internal and external_security_threats_to_pakistanInternal and external_security_threats_to_pakistan
Internal and external_security_threats_to_pakistan
National university of modern languages
 
Foreign policy of pakistan
Foreign policy of pakistanForeign policy of pakistan
Foreign policy of pakistan
National university of modern languages
 
Itc chapter # 8
Itc   chapter # 8Itc   chapter # 8
Itc chapter # 7
Itc   chapter # 7Itc   chapter # 7
Itc chapter # 6
Itc   chapter # 6Itc   chapter # 6
Itc chapter # 4
Itc   chapter # 4Itc   chapter # 4
Itc chapter # 3
Itc   chapter # 3Itc   chapter # 3
Itc chapter # 2
Itc   chapter # 2Itc   chapter # 2
Chapter1
Chapter1Chapter1
Itc chapter # 9
Itc   chapter # 9Itc   chapter # 9
Fall of communism
Fall of communismFall of communism
External challenges to pakistan
External challenges to pakistanExternal challenges to pakistan
External challenges to pakistan
National university of modern languages
 
Types of the speech
Types of the speechTypes of the speech
Types letters
Types lettersTypes letters
Feminism
FeminismFeminism
Exec macro-economic indicators
Exec macro-economic indicatorsExec macro-economic indicators
Exec macro-economic indicators
National university of modern languages
 

More from National university of modern languages (20)

Heart land Theory
Heart land TheoryHeart land Theory
Heart land Theory
 
Science and technology in society
Science and technology in societyScience and technology in society
Science and technology in society
 
Germanys way to_democracy
Germanys way to_democracyGermanys way to_democracy
Germanys way to_democracy
 
Terrorism in Pakistan
Terrorism in PakistanTerrorism in Pakistan
Terrorism in Pakistan
 
Internal and external_security_threats_to_pakistan
Internal and external_security_threats_to_pakistanInternal and external_security_threats_to_pakistan
Internal and external_security_threats_to_pakistan
 
Foreign policy of pakistan
Foreign policy of pakistanForeign policy of pakistan
Foreign policy of pakistan
 
Itc chapter # 8
Itc   chapter # 8Itc   chapter # 8
Itc chapter # 8
 
Itc chapter # 7
Itc   chapter # 7Itc   chapter # 7
Itc chapter # 7
 
Itc chapter # 6
Itc   chapter # 6Itc   chapter # 6
Itc chapter # 6
 
Itc chapter # 4
Itc   chapter # 4Itc   chapter # 4
Itc chapter # 4
 
Itc chapter # 3
Itc   chapter # 3Itc   chapter # 3
Itc chapter # 3
 
Itc chapter # 2
Itc   chapter # 2Itc   chapter # 2
Itc chapter # 2
 
Chapter1
Chapter1Chapter1
Chapter1
 
Itc chapter # 9
Itc   chapter # 9Itc   chapter # 9
Itc chapter # 9
 
Fall of communism
Fall of communismFall of communism
Fall of communism
 
External challenges to pakistan
External challenges to pakistanExternal challenges to pakistan
External challenges to pakistan
 
Types of the speech
Types of the speechTypes of the speech
Types of the speech
 
Types letters
Types lettersTypes letters
Types letters
 
Feminism
FeminismFeminism
Feminism
 
Exec macro-economic indicators
Exec macro-economic indicatorsExec macro-economic indicators
Exec macro-economic indicators
 

Recently uploaded

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

Itc chapter # 11

  • 1. COMPUTER & DATA SECURITY Introduction to Computing CHAPTER # 11
  • 2. Introduction to Computing 2Chapter # 11 Security  Security is about the protection of assets  It can be computer, network or data security  Security is a set of procedures that protect  You, your employees, and your peers  Paper or electronic media  Hardware, software, and networks  It protects from damage, theft, or change  There can be different security measures  Prevention  measures taken to protect your assets from being damaged  Detection  measures taken to allow you to detect when an asset has been damaged, how it was damaged and who damaged it  Reaction  measures that allow you to recover your assets
  • 3. Introduction to Computing 3Chapter # 11 Computer Security  Computer security is information security as applied to computers and networks  The field covers all the processes and mechanisms by which computer-based equipment, information, networks and services are protected from unintended or unauthorized access, change or destruction  It also includes protection from unplanned events and natural disasters
  • 4. Introduction to Computing 4Chapter # 11 Security Properties  Confidentiality  ensures that the data is only read by the intended recipients  Integrity  ensures that all of the data has not been corrupted from its original source  The system continues to operate properly.  Availability  Actions by an attacker do not prevent users from having access to use of the system  guarantees that the data is usable upon demand  Accountability  it is audit information that is kept and protected so that security actions can be traced to the responsible party
  • 5. Introduction to Computing 5Chapter # 11 Highly Vulnerable  Financial institutions and banks  Internet service providers  Government and defense agencies  Multinational corporations  Pharmaceutical companies  Contractors to various government agencies  Anyone on the Internet
  • 6. Introduction to Computing 6Chapter # 11 Types of Attacks  Denial of Service (D.o.S) attacks  D.o.S attacks have one goal – to knock your service off the net  Crash your host  Flood your host  Flood the network connecting to your host  Viruses  A computer virus attaches itself to files on the target machine  Master Boot Sector/Boot Sector viruses  File viruses, Macro viruses  Stealth viruses, Polymorphic viruses
  • 7. Introduction to Computing 7Chapter # 11 Types of Attacks  Trojans  Trojans are programs that appear to perform a desirable and necessary function that perform functions unknown to (and probably unwanted by) the user  Worms  Worms are memory resident viruses  Unlike a virus, which seeds itself in the computer's hard disk or file system, a worm will only maintain a functional copy of itself in active memory  Worms frequently “sleep” until some event triggers their activity  e.g. send password file to hacker, send copy of registry to hacker  Worms and Trojans are frequent methods by which Backdoors are enabled on a system  Backdoors  Such programs give remote access to the computer from anywhere on the Internet  e.g. Back Orifice, BO2K, Sub-Seven)
  • 8. Introduction to Computing 8Chapter # 11 Types of Attacks  Sniffers  Devices that capture network packets  Extremely difficult to detect because they are passive  Scanners  Programs that automatically detect security weaknesses in remote or local hosts  Tells the hacker  What services are currently running  What users own those services  Whether anonymous logins are supported  Whether certain network services require authentication  Password Crackers  Some actually try to decrypt  Most simply try “brute force” or intelligent “brute force”  Dictionary words, days of year, initials
  • 9. Introduction to Computing 9Chapter # 11 Types of Attacks  Social Engineering  “This is MIS, I can fix your e-mail box, what’s your password?”  Email Spoofing  It tricks the user in believing that the email originated from a certain user such as an administrator although it actually originated from a hacker  Such emails may solicit personal information such as credit card details and passwords  Examining the email header may provide some additional information about the origin of the email
  • 10. Introduction to Computing 10Chapter # 11 How Do We Protect  Anti-virus software  Personal Anti-virus SW on your machine  Make sure it is set to scan all executables, compressed files, e-mail, e-mail attachments, web pages  Keep your virus information files up to date!!!  Firewalls  A combination of hardware and software resources positioned between the local (trusted) network and [an untrusted network]  It ensures that all communication between an organization's network and the Internet connection conforms to the organization's security policy  It tracks and controls communications, deciding whether to pass, reject, encrypt, or log communications
  • 11. Introduction to Computing 11Chapter # 11 Cryptography  Cryptography is the practice and study of techniques for secure communication in the presence of third parties  Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering  Applications of cryptography include ATM cards, computer passwords, and electronic commerce  Simply – secret codes  Encryption  Converting data to unreadable codes to prevent anyone form accessing this information  Need a “key” to find the original data  keys take a few million-trillion years to guess  Public keys  An ingenious system of proving you know your password without disclosing your password. Also used for digital signatures  Used heavily in SSL connections  Hashing  Creating fingerprints of documents
  • 12. Introduction to Computing 12Chapter # 11 Cryptography Symmetric encryption Authentication Asymmetric encryption Public Key Infrastructure
  • 13. Introduction to Computing 13Chapter # 11 Steganography  Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message  It is a form of security through obscurity  Message appears to be something else  images, articles, shopping lists, or some other cover-text  Classically, the hidden message may be in invisible ink between the visible lines of a private letter  Messages do not attract attention to themselves  It is high security technique for long data transmission
  • 14. Introduction to Computing 14Chapter # 11 Watermarking  Watermarking is the process of hiding digital information in a carrier signal  It is a technique in which a kind of marker is embedded in a signal such as audio or image data  Used to identify ownership of the copyright of such signal  Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners  It is prominently used for tracing copyright infringements and for banknote authentication