SlideShare a Scribd company logo
1 of 23
Security problems
By: Asst. Lec. Afrah Salman Dawood
Outline
• Internet based fraud
• Password hacking
• Viruses
• Encryption and decryption keys
• Firewalls
• Anti-virus software
• Digital Signatures and certificates
• Computer-related crime.
Internet Fraud
• It is a type of fraud or deception which makes use of
the internet and could involve hiding of information or
providing incorrect information for the purpose of tricking
victims out of money, property, and inheritance.
Types of Internet Fraud
Credit/ Debit Card Fraud
Business Deceit
Recruitment Cheque Scam
Advance Fee Fraud
Non-Delivery of Goods/ Service Fraud
Password Hacking
• Password cracking is the process of recovering secret
passwords from data that has been stored in or transmitted by
computer system.
Types of Password Hacking
Website Hacking
Network Hacking
Ethical Hacking
Email Hacking
Password Hacking
Online Banking Hacking
Computer Hacking
Viruses
• A virus is a small piece of software that piggybacks on real
programs in order to get executed
• Once it’s running, it spreads by inserting copies of itself into
other executable code or documents .
• Typical things that can do to PCs’ are:
1. Display a message
2. Erase files
3. Scramble data on a hard disk
4. Cause erratic screen behavior
5. Halt the PC
6. Many viruses do nothing obvious at all except spread!
Types of Viruses
Time Bomb
Logical Bomb
Worm
Boot Sector Virus
Macros Virus
Trojan Horse
Encryption and Decryption
• Encryption is the process of converting plaintext message into a
ciphertext message.
• Decryption is the process of converting ciphertext message into
a plaintext message.
• The same key must be used in both processes.
• The process of encryption and decryption is called cryptography.
Key
Types of Cryptography Keys
• A cryptographic key is a string of data that is used to lock or
unlock cryptographic functions, including authentication,
authorization and encryption.
• It is categorized according to how it will be used and what
properties it has. It might have one of the following
properties: Symmetric or Asymmetric, Public or Private.
algorithms use
separate keys
for encryption
and decryption
algorithms use
separate keys for
encryption and
decryption
algorithms use
separate keys
for encryption
and decryption
algorithms use
separate keys for
encryption and
decryption
Firewalls
• It is a program or hardware device that filters the information
coming through the internet connection into your private
network or computer system.
• An application firewall is a special firewall that is specifically
coded for the type of traffic it is inspecting and the most
widely developed application is web application firewall.
Types of Firewall
Packet filtering firewall
Circuit-level gateway
Stateful inspection firewall
Application-level gateway (aka proxy firewall)
Next-generation firewall (NGFW)
Anti-virus software
• It is a sw used to prevent, detect and remove all sorts of
malware such as computer viruses, hijackers, Trojan horses,
etc.
• Popular types of anti-viruses used today are:
1. Kaspersky Lab
2. McAfee Virus Scan
3. Avira Antivirus Software
4. Avast Antivirus Software
5. AVG Antivirus and Internet Security
6. Norton Antivirus Software
7. Panda Antivirus Software
Digital Signatures and Certificates
• It is a type of asymmetric cryptography used to simulate the
security properties of a signature in digital, rather than
written, form. Digital signature schemes normally give two
algorithms, one for signing which involves the user's secret or
private key, and one for verifying signatures which involves the
user's public key. The output of the signature process is called
the "digital signature“.
• Digital Certificate is a data with digital signature from one
trusted Certification Authority (CA) or trusted third party. This
data contains: Who owns this certificate, Who signed this
certificate, The expired date, User name & address.
Computer-related crime
• Refers to all the activities done with criminal intent in
cyberspace.
• It may be any crime that involves a computer/mobile and a
network. The computer may have been used in the commission
of a crime, or it may be the target.
Classification of Computer Crimes
Fraud and financial crimes.
Cyber terrorism.
Cyber extortion.
Cyber warfare.
Additionally, computer crime can be categorized as:
Individual
Property
Government
Types of Computer Crimes
• Hacking
• Denial of Service (DoS) Attack
• Cyber Stalking
• Identity Theft
• Malicious Software
• Child Soliciting and Abuse
• Computer Vandalism
• Software Piracy
• Virus Dissemination
Questions?

More Related Content

Similar to Security problems.pptx

Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.Ankur Kumar
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeNithilan1
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityGeevarghese Titus
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methodslapao2014
 

Similar to Security problems.pptx (20)

Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
6 security
6 security6 security
6 security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
E secuity
E secuityE secuity
E secuity
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber Security.pdf
Cyber Security.pdfCyber Security.pdf
Cyber Security.pdf
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Security Requirements in eBusiness
Security Requirements in eBusinessSecurity Requirements in eBusiness
Security Requirements in eBusiness
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
Unit 3
Unit 3Unit 3
Unit 3
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 

More from University of Technology - Iraq

Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...University of Technology - Iraq
 
Parallel Algorithms: Sort & Merge, Image Processing, Fault Tolerance
Parallel Algorithms: Sort & Merge, Image Processing, Fault ToleranceParallel Algorithms: Sort & Merge, Image Processing, Fault Tolerance
Parallel Algorithms: Sort & Merge, Image Processing, Fault ToleranceUniversity of Technology - Iraq
 

More from University of Technology - Iraq (19)

www.pptx
www.pptxwww.pptx
www.pptx
 
Information System (IS) life cycle.pptx
Information System (IS) life cycle.pptxInformation System (IS) life cycle.pptx
Information System (IS) life cycle.pptx
 
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
 
Ch12 microprocessor interrupts
Ch12 microprocessor interruptsCh12 microprocessor interrupts
Ch12 microprocessor interrupts
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
 
IP address and Domain name
IP address and Domain nameIP address and Domain name
IP address and Domain name
 
Computer science mcq alle books4u
Computer science mcq   alle books4uComputer science mcq   alle books4u
Computer science mcq alle books4u
 
Switches and LEDs interface to the 8051 microcontroller
Switches and LEDs interface to the 8051 microcontrollerSwitches and LEDs interface to the 8051 microcontroller
Switches and LEDs interface to the 8051 microcontroller
 
VANET
VANETVANET
VANET
 
Parallel Algorithms: Sort & Merge, Image Processing, Fault Tolerance
Parallel Algorithms: Sort & Merge, Image Processing, Fault ToleranceParallel Algorithms: Sort & Merge, Image Processing, Fault Tolerance
Parallel Algorithms: Sort & Merge, Image Processing, Fault Tolerance
 
Wavelet Transform and DSP Applications
Wavelet Transform and DSP ApplicationsWavelet Transform and DSP Applications
Wavelet Transform and DSP Applications
 
FSK, PSK, QAM
FSK, PSK, QAMFSK, PSK, QAM
FSK, PSK, QAM
 
SCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATION
SCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATIONSCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATION
SCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATION
 
DSB-SC Demodulation using matlab
DSB-SC Demodulation using matlabDSB-SC Demodulation using matlab
DSB-SC Demodulation using matlab
 
Main memory-2 (ch8,os)
Main memory-2 (ch8,os)Main memory-2 (ch8,os)
Main memory-2 (ch8,os)
 
CMOS
CMOSCMOS
CMOS
 
Wap
WapWap
Wap
 
8086 microprocessor lab manual
8086 microprocessor lab manual8086 microprocessor lab manual
8086 microprocessor lab manual
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Security problems.pptx

  • 1. Security problems By: Asst. Lec. Afrah Salman Dawood
  • 2. Outline • Internet based fraud • Password hacking • Viruses • Encryption and decryption keys • Firewalls • Anti-virus software • Digital Signatures and certificates • Computer-related crime.
  • 3. Internet Fraud • It is a type of fraud or deception which makes use of the internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance.
  • 4. Types of Internet Fraud Credit/ Debit Card Fraud Business Deceit Recruitment Cheque Scam Advance Fee Fraud Non-Delivery of Goods/ Service Fraud
  • 5. Password Hacking • Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by computer system.
  • 6. Types of Password Hacking Website Hacking Network Hacking Ethical Hacking Email Hacking Password Hacking Online Banking Hacking Computer Hacking
  • 7. Viruses • A virus is a small piece of software that piggybacks on real programs in order to get executed • Once it’s running, it spreads by inserting copies of itself into other executable code or documents . • Typical things that can do to PCs’ are: 1. Display a message 2. Erase files 3. Scramble data on a hard disk 4. Cause erratic screen behavior 5. Halt the PC 6. Many viruses do nothing obvious at all except spread!
  • 8. Types of Viruses Time Bomb Logical Bomb Worm Boot Sector Virus Macros Virus Trojan Horse
  • 9. Encryption and Decryption • Encryption is the process of converting plaintext message into a ciphertext message. • Decryption is the process of converting ciphertext message into a plaintext message. • The same key must be used in both processes. • The process of encryption and decryption is called cryptography. Key
  • 10. Types of Cryptography Keys • A cryptographic key is a string of data that is used to lock or unlock cryptographic functions, including authentication, authorization and encryption. • It is categorized according to how it will be used and what properties it has. It might have one of the following properties: Symmetric or Asymmetric, Public or Private. algorithms use separate keys for encryption and decryption algorithms use separate keys for encryption and decryption algorithms use separate keys for encryption and decryption algorithms use separate keys for encryption and decryption
  • 11. Firewalls • It is a program or hardware device that filters the information coming through the internet connection into your private network or computer system. • An application firewall is a special firewall that is specifically coded for the type of traffic it is inspecting and the most widely developed application is web application firewall.
  • 12. Types of Firewall Packet filtering firewall Circuit-level gateway Stateful inspection firewall Application-level gateway (aka proxy firewall) Next-generation firewall (NGFW)
  • 13. Anti-virus software • It is a sw used to prevent, detect and remove all sorts of malware such as computer viruses, hijackers, Trojan horses, etc. • Popular types of anti-viruses used today are: 1. Kaspersky Lab 2. McAfee Virus Scan 3. Avira Antivirus Software 4. Avast Antivirus Software 5. AVG Antivirus and Internet Security 6. Norton Antivirus Software 7. Panda Antivirus Software
  • 14.
  • 15. Digital Signatures and Certificates • It is a type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. Digital signature schemes normally give two algorithms, one for signing which involves the user's secret or private key, and one for verifying signatures which involves the user's public key. The output of the signature process is called the "digital signature“. • Digital Certificate is a data with digital signature from one trusted Certification Authority (CA) or trusted third party. This data contains: Who owns this certificate, Who signed this certificate, The expired date, User name & address.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Computer-related crime • Refers to all the activities done with criminal intent in cyberspace. • It may be any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • 21. Classification of Computer Crimes Fraud and financial crimes. Cyber terrorism. Cyber extortion. Cyber warfare. Additionally, computer crime can be categorized as: Individual Property Government
  • 22. Types of Computer Crimes • Hacking • Denial of Service (DoS) Attack • Cyber Stalking • Identity Theft • Malicious Software • Child Soliciting and Abuse • Computer Vandalism • Software Piracy • Virus Dissemination