SlideShare a Scribd company logo
INTRODUCTION
Security Is the major issue in the computer field so, it
must be addressed by using some techniques in
order to secure our system.
Data can be hacked by the hackers and cause
damages to the computers. Some of the possible
damages that can be made to the computers are
malware virus, worms, spyware and cookies etc.
THREATS TO COMPUTER
SYSTEM
 MALWARE :-Malware' is an umbrella term used to refer to a variety of forms
of hostile or intrusive software, including computer viruses, worms, Trojan
horses, ransomware, spyware, adware, scareware, and other malicious
programs. It can take the form of executable code, scripts, active content,
and other software.
 VIRUS :-In addition to copying itself, a computer virus can also execute
instructions that cause harm. For this reason, computer viruses affect
security. They are part of malware. Very often, the term is also used for other
kinds of malware, such as Trojan horses and worms.
 WORMS :-A computer worm is a standalone malware computer program
that replicates itself in order to spread to other computers. Often, it uses a
computer network to spread itself, relying on security failures on the target
computer to access it. Unlike a computer virus, it does not need to attach
itself to an existing program.
 SPYWARE :-Spyware is a type of malware that is installed on a computer
without the knowledge of the owner in order to collect the owner's private
information. Spyware is often hidden from the user in order to gather
information about internet interaction, keystrokes (also known as
keylogging), passwords, and other valuable data.
 COOKIES :-A possible interaction between a web browser and a server
holding a web page in which the server sends a cookie to the browser and
the browser sends it back when requesting another page. Cookies are
arbitrary pieces of data, usually chosen by the web server, and stored on
the client computer by the browser.
 TROJAN :-In computers, a Trojan horse is a program in which malicious or
harmful code is contained inside apparently harmless programming or
data in such a way that it can get control and do its chosen form of
damage, such as ruining the file allocation table on your hard disk.
COMPUTER SECURITY
Computer security, also known as cybersecurity or IT security, is
the protection of information systems from theft or damage to
the hardware, the software, and to the information on them, as
well as from disruption or misdirection of the services they
provide.
 A computer should be used only by authorized users.
 Password should be changed regularly.
 Personal information and password should not be shared.
 Regularly update your antivirus software.
 DESKTOP SECURITY :- Using anti-virus software is one way to counter
computer threats. Moreover, these software are used after a virus has attacked
the computer. There are ways and measures by which we can restrict viruses to
enter into the computer. These measures collectively come under "Desktop
security" which includes software authorization, authentication, firewalls, encrypted
channels, anti-virus tools and user education.
 NETWORK SECURITY :-network security (or information security) is to provide
protection to the computer system from the hackers (intruders). Network
security focuses on protecting data resources from external attack and also from
simple mistakes made by the users within an organization.
 FIREWALL :- A firewall is a technique used in a secured computer system or
network to block unauthorized access and allow only the authorized user.
Firewalls can be implemented in either hardware or software, or a combination of
both.
 DIGITAL SIGNATURE :-In case of Cyber Crime, a digital signature plays a significant
role to ensure authenticity and thus protect security of a computer system. A
digital signature is a method for proving the authenticity of a message or
document or attachment or software sent through email.
 DIGITAL CERTIFICATE :- A digital certificate (also known as a public key
certificate or identity certificate) is an electronic document which uses a
digital signature to bind together a public key or password required
for decode and encoded document with an authentic identity such as the
name of a person or an organization, their phone numbers or address, and
so forth. The certificate can be used to verify that a public key belongs to
an authorized individual or organization.
 FILE ACCESS PERMISSION :-In a computer network or even in the
internet, some files or documents are made shareable and some are
made public. The protected sharable files and documents are shared
among few users or even by a group having the access rights. Access
rights are generally decided and given by the owner of the file or the
network administrator. Thus the three types of users can access a file or a
folder i.e. Owner, user having access rights, or all other users.
Software can be divided into different types depending upon their uses and
application. Software can be broadly divided into two categories such as
System Software & Application Software. Software required to run and
maintain basic components of computer system come under the
category of system software whereas software required to solve some
specific task of daily use is generally called application software. An
operating system is an example of system software while
documentation tool, a presentation tool, a spreadsheet tool are all examples
of application software. Even your favorite computer game is an example of
application software.
 System software
 Utility software
 Application software
Being an electronic device, a computer as such can not perform anything of
its own. The functions of all the physical components of a computer
system are guided by some instructions or program collectively known
as System Software. System Software controls all internal activities inside
a computer system and between all attached components of a computer
system. It controls all possible activities inside the computer system which can
be summarized as follows:
 Reads data and instructions through the input devices;
 Translates all data and instruction into computer understandable form and
vice versa;
 Controls all devices attached to the computer system;
 Processes and generates the result on the output devices;
Ex:- BIOS, Operating system, Device drives, Language processors.
 The basic input/output system (BIOS) is also
commonly known as the System BIOS. The BIOS is boot
firmware, a small program that controls various electronic
devices attached to the main computer system. It is
designed to be the first set of instructions run by a
Computer when powered on. The initial function of the
BIOS is to initialize system devices such as the RAM, hard
disk, CD/DVD drive, video display card, and other hardware.
The BIOS sets the machine hardware into a known state to
help the operating system to configure the hardware
components. This process is known as booting, or booting
up.
 Operating system provides a software
platform, on top of which, other programs,
called application programs are run. The
application programs must be written to run
on the environment of a particular operating
system. Our choice of operating system,
therefore, depends to a great extent on the
CPU and the other attached devices and the
applications we want to run. For PCs,
some of the most popular operating
systems are Microsoft Windows, Linux, Mac
OS, Solaris, BOSS, etc.
 As discussed above, a computer system understands only machine
language or binary language, also known as Low Level Language (LLL).
This language is extremely difficult to learn for a general programmer
and thus there is a need for some special language that is easy to learn
and understand for the programmer in order to interact with the
computer system. These special languages or set of commands are
collectively known as programming languages or High Level
languages (HLL). Some examples of High Level Programming
Languages are Basic, C, C++, JAVA, etc. These high level programming
languages can easily be translated into machine language and vice versa
using language translators like assembler or Interpreter or Compiler. These
translators are also known as language processors.
 Application software is a set of programs to carry out a specific task like
word processor, spreadsheet, presentation tools, library management
software, railway reservation, antivirus software, etc. Generally an
application software can perform only one specific job and can not be
used for something else. For instance, a library management software can
not be used for railway reservation system or a word processing
software is generally not used as a spreadsheet.
Application Software can be divided into different categories depending
upon their uses as follows:
 Utility Software
 General Purpose Application Software
 Specific Purpose Application Software
 Developer Tools
system Security

More Related Content

What's hot

Network security
Network securityNetwork security
Network security
Estiak Khan
 
Security policies
Security policiesSecurity policies
Security policies
Nishant Pahad
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
abdullah roomi
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
Ramesh Upadhaya
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
n|u - The Open Security Community
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
Maxime ALAY-EDDINE
 
Computer security
Computer securityComputer security
Computer security
fiza1975
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
System Security
System SecuritySystem Security
System Security
Reddhi Basu
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
Deborah Obasogie
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
Dr. Ahmed Al Zaidy
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
Security policies
Security policiesSecurity policies
Security policies
 
Cia security model
Cia security modelCia security model
Cia security model
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Computer security
Computer securityComputer security
Computer security
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
System Security
System SecuritySystem Security
System Security
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
Network Security
Network SecurityNetwork Security
Network Security
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
 
Cyber security
Cyber securityCyber security
Cyber security
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 

Viewers also liked

National parks of india
National parks of indiaNational parks of india
National parks of india
Gaurav Mishra
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System ThreatsReddhi Basu
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
jayussuryawan
 
Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23
DefconRussia
 
Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11BarrBoy
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The SystemSteven Cahill
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
Wayne Jones Jnr
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
faraz hussain
 
Operating system security
Operating system securityOperating system security
Operating system securityRachel Jeewa
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
sohaildanish
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
Information Technology
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
Abou Bakr Ashraf
 
Enabling Worm and Malware Investigation Using Virtualization
Enabling Worm and Malware Investigation Using VirtualizationEnabling Worm and Malware Investigation Using Virtualization
Enabling Worm and Malware Investigation Using Virtualization
amiable_indian
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Viewers also liked (16)

National parks of india
National parks of indiaNational parks of india
National parks of india
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
Operating system security
Operating system securityOperating system security
Operating system security
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
Enabling Worm and Malware Investigation Using Virtualization
Enabling Worm and Malware Investigation Using VirtualizationEnabling Worm and Malware Investigation Using Virtualization
Enabling Worm and Malware Investigation Using Virtualization
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar to system Security

Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorial
SayeedAsghar
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentation
paddy249
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer software
Elike Ikechukwu
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
Samiullah Khan
 
Hardware , software and filmware
Hardware , software and filmwareHardware , software and filmware
Hardware , software and filmware
MH Shihab
 
Other Systems & Application Software
Other Systems & Application SoftwareOther Systems & Application Software
Computer-Systems.pptx-hhh-yyyy-wwww+yyyy
Computer-Systems.pptx-hhh-yyyy-wwww+yyyyComputer-Systems.pptx-hhh-yyyy-wwww+yyyy
Computer-Systems.pptx-hhh-yyyy-wwww+yyyy
LisleySebumpan
 
software4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdfsoftware4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdf
sachin325314
 
Software (4).ppt
Software (4).pptSoftware (4).ppt
Software (4).ppt
rishirvk1995
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
JohnRebenRequinto1
 
Difference Between Software and hardware
Difference Between Software and hardwareDifference Between Software and hardware
Difference Between Software and hardware
Zeeshan Ilyas
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentationPranjal Mishra
 
System Software
System SoftwareSystem Software
System Software
NaqashAhmad14
 
Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)
Fernando Torres
 
Software security
Software securitySoftware security
Software security
jes_d
 
ICT Skills.pdf
ICT Skills.pdfICT Skills.pdf
ICT Skills.pdf
TENZING LHADON
 
Computer networks note 3
Computer networks note 3Computer networks note 3
Computer networks note 3
MDHASNAIN23
 
Basic of Computer software
Basic of Computer softwareBasic of Computer software
Basic of Computer software
suraj pandey
 

Similar to system Security (20)

Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorial
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentation
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer software
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Hardware , software and filmware
Hardware , software and filmwareHardware , software and filmware
Hardware , software and filmware
 
Other Systems & Application Software
Other Systems & Application SoftwareOther Systems & Application Software
Other Systems & Application Software
 
Computer-Systems.pptx-hhh-yyyy-wwww+yyyy
Computer-Systems.pptx-hhh-yyyy-wwww+yyyyComputer-Systems.pptx-hhh-yyyy-wwww+yyyy
Computer-Systems.pptx-hhh-yyyy-wwww+yyyy
 
software4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdfsoftware4-150511081405-lva1-app6892 2.pdf
software4-150511081405-lva1-app6892 2.pdf
 
Software (4).ppt
Software (4).pptSoftware (4).ppt
Software (4).ppt
 
Software
SoftwareSoftware
Software
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Difference Between Software and hardware
Difference Between Software and hardwareDifference Between Software and hardware
Difference Between Software and hardware
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentation
 
System Software
System SoftwareSystem Software
System Software
 
Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)
 
Software security
Software securitySoftware security
Software security
 
ICT Skills.pdf
ICT Skills.pdfICT Skills.pdf
ICT Skills.pdf
 
It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossary
 
Computer networks note 3
Computer networks note 3Computer networks note 3
Computer networks note 3
 
Basic of Computer software
Basic of Computer softwareBasic of Computer software
Basic of Computer software
 

Recently uploaded

The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 

Recently uploaded (20)

The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 

system Security

  • 1.
  • 2. INTRODUCTION Security Is the major issue in the computer field so, it must be addressed by using some techniques in order to secure our system. Data can be hacked by the hackers and cause damages to the computers. Some of the possible damages that can be made to the computers are malware virus, worms, spyware and cookies etc.
  • 3. THREATS TO COMPUTER SYSTEM  MALWARE :-Malware' is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.  VIRUS :-In addition to copying itself, a computer virus can also execute instructions that cause harm. For this reason, computer viruses affect security. They are part of malware. Very often, the term is also used for other kinds of malware, such as Trojan horses and worms.  WORMS :-A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.
  • 4.  SPYWARE :-Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data.  COOKIES :-A possible interaction between a web browser and a server holding a web page in which the server sends a cookie to the browser and the browser sends it back when requesting another page. Cookies are arbitrary pieces of data, usually chosen by the web server, and stored on the client computer by the browser.  TROJAN :-In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk.
  • 5. COMPUTER SECURITY Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.  A computer should be used only by authorized users.  Password should be changed regularly.  Personal information and password should not be shared.  Regularly update your antivirus software.
  • 6.  DESKTOP SECURITY :- Using anti-virus software is one way to counter computer threats. Moreover, these software are used after a virus has attacked the computer. There are ways and measures by which we can restrict viruses to enter into the computer. These measures collectively come under "Desktop security" which includes software authorization, authentication, firewalls, encrypted channels, anti-virus tools and user education.  NETWORK SECURITY :-network security (or information security) is to provide protection to the computer system from the hackers (intruders). Network security focuses on protecting data resources from external attack and also from simple mistakes made by the users within an organization.  FIREWALL :- A firewall is a technique used in a secured computer system or network to block unauthorized access and allow only the authorized user. Firewalls can be implemented in either hardware or software, or a combination of both.  DIGITAL SIGNATURE :-In case of Cyber Crime, a digital signature plays a significant role to ensure authenticity and thus protect security of a computer system. A digital signature is a method for proving the authenticity of a message or document or attachment or software sent through email.
  • 7.  DIGITAL CERTIFICATE :- A digital certificate (also known as a public key certificate or identity certificate) is an electronic document which uses a digital signature to bind together a public key or password required for decode and encoded document with an authentic identity such as the name of a person or an organization, their phone numbers or address, and so forth. The certificate can be used to verify that a public key belongs to an authorized individual or organization.  FILE ACCESS PERMISSION :-In a computer network or even in the internet, some files or documents are made shareable and some are made public. The protected sharable files and documents are shared among few users or even by a group having the access rights. Access rights are generally decided and given by the owner of the file or the network administrator. Thus the three types of users can access a file or a folder i.e. Owner, user having access rights, or all other users.
  • 8. Software can be divided into different types depending upon their uses and application. Software can be broadly divided into two categories such as System Software & Application Software. Software required to run and maintain basic components of computer system come under the category of system software whereas software required to solve some specific task of daily use is generally called application software. An operating system is an example of system software while documentation tool, a presentation tool, a spreadsheet tool are all examples of application software. Even your favorite computer game is an example of application software.  System software  Utility software  Application software
  • 9. Being an electronic device, a computer as such can not perform anything of its own. The functions of all the physical components of a computer system are guided by some instructions or program collectively known as System Software. System Software controls all internal activities inside a computer system and between all attached components of a computer system. It controls all possible activities inside the computer system which can be summarized as follows:  Reads data and instructions through the input devices;  Translates all data and instruction into computer understandable form and vice versa;  Controls all devices attached to the computer system;  Processes and generates the result on the output devices; Ex:- BIOS, Operating system, Device drives, Language processors.
  • 10.  The basic input/output system (BIOS) is also commonly known as the System BIOS. The BIOS is boot firmware, a small program that controls various electronic devices attached to the main computer system. It is designed to be the first set of instructions run by a Computer when powered on. The initial function of the BIOS is to initialize system devices such as the RAM, hard disk, CD/DVD drive, video display card, and other hardware. The BIOS sets the machine hardware into a known state to help the operating system to configure the hardware components. This process is known as booting, or booting up.
  • 11.  Operating system provides a software platform, on top of which, other programs, called application programs are run. The application programs must be written to run on the environment of a particular operating system. Our choice of operating system, therefore, depends to a great extent on the CPU and the other attached devices and the applications we want to run. For PCs, some of the most popular operating systems are Microsoft Windows, Linux, Mac OS, Solaris, BOSS, etc.
  • 12.
  • 13.
  • 14.  As discussed above, a computer system understands only machine language or binary language, also known as Low Level Language (LLL). This language is extremely difficult to learn for a general programmer and thus there is a need for some special language that is easy to learn and understand for the programmer in order to interact with the computer system. These special languages or set of commands are collectively known as programming languages or High Level languages (HLL). Some examples of High Level Programming Languages are Basic, C, C++, JAVA, etc. These high level programming languages can easily be translated into machine language and vice versa using language translators like assembler or Interpreter or Compiler. These translators are also known as language processors.
  • 15.  Application software is a set of programs to carry out a specific task like word processor, spreadsheet, presentation tools, library management software, railway reservation, antivirus software, etc. Generally an application software can perform only one specific job and can not be used for something else. For instance, a library management software can not be used for railway reservation system or a word processing software is generally not used as a spreadsheet. Application Software can be divided into different categories depending upon their uses as follows:  Utility Software  General Purpose Application Software  Specific Purpose Application Software  Developer Tools