SYSTEM SECURITY
SYSTEM SECURITY
Securing data and information from unauthorized user’s and
intruders.
This include the method by which we can secure or data.
It include also the security related to internet.
Question among us-:
• How we can secure our systems (This include all the devices) .
• what are the factors responsible for threaten the system security
,Either online security or offline security .
• How we can prevent from them
• How to secure our data or information.
How to secure or Data
 By using best purchase antivirus(Avast,Quickheal,Avira etc.)
 By less Downloading software and Data from internet.(using
vpn and proxy)
 By password protection data(encryption and decryption
methods ).
 Increasing knowledge about different system security methods.
 by acess control (giving permissions.)
FIREWALL
 It’s a barrier which help the user to secure User’s data or
information to getting leaked and steal by intruder’s.
 Its secure our devices from all the malware or infected files
which found over the internet network.
 Firewall uses different packet filter method and gateways to
secure information.
 Its also secure internet by malware which are give by the
user’s(while uploading files).
Limitation-:
• Firewalls cannot stop internal users from accessing websites with
malicious code.
• Cannot protect against internal threats.
Ex- Disgruntled or colluding employees.
• Cannot protect against transfer of all virus infected programs or
files – because of huge range of O/S & file types.
• Antivirus is a software to secure computer(devices) from all
malware.
• *Today Antivirus working as firewall also. Giving online payment
security, intruder selfie, antispyware, real-time protection etc.
Ex-:
• Protogen
• Avast
• Avira etc.
ANTIVIRUS
MALWARE’S1.VIRUS-:
These are the unwanted programs which are found commonly
in any computer devices to damage the files or data.These are
basically found in exicutable files.
EX-:
@echo off
Shutdown.exe -s -t 10
cls
msg * Sorry bro!
2.TROJAN-
This malware which steal user’s data help hacker(creator of
trojan malware) or the government to track user’s location ,information
and confidential data for their own purposes.
3.WORMS-
This malware can replicate it self by one to many’s.This basically
filled user’s memory from dumpied files.
Its create multiple files and folder’s of same name’s and replicating but
not infecting program.
4. RANSOMEWARE-
This software basically encryped the user’s data and then the
hacker wants the ransom money to decrypt the data.
5.KEYLOGGER-
This software works when the user’s uses the keyboard. This
software records all the user keyboard word typed by the user.
6.GREYWARE-
When user get infected by the Gayware malware, so they found
the unwanted ads on the device screen .
INTERNET OF THING’S
A group of all the devices which are connect through a wireless connection and
they can easily communicate with the without a human interaction in it.
The concept was simple but powerful and introduce by Kevin Ashton In the early
2000’s.
The Three C’s of IoT
• Communication-: IoT communicates information to people and systems in a
effective ways.
• Control and Automation-: In a connected world, a business will have visibility
into a device’s condition. In many cases, a business or consumer will also be
able to remotely control a device.
• Cost Savings-: Many companies will adopt IoT to save money. Measurement
provides actual performance data and equipment health, instead of just
estimates.
Thank-you for paying
attention.
Are there any questions?

System security

  • 1.
  • 2.
    SYSTEM SECURITY Securing dataand information from unauthorized user’s and intruders. This include the method by which we can secure or data. It include also the security related to internet. Question among us-: • How we can secure our systems (This include all the devices) . • what are the factors responsible for threaten the system security ,Either online security or offline security . • How we can prevent from them • How to secure our data or information.
  • 3.
    How to secureor Data  By using best purchase antivirus(Avast,Quickheal,Avira etc.)  By less Downloading software and Data from internet.(using vpn and proxy)  By password protection data(encryption and decryption methods ).  Increasing knowledge about different system security methods.  by acess control (giving permissions.)
  • 4.
    FIREWALL  It’s abarrier which help the user to secure User’s data or information to getting leaked and steal by intruder’s.  Its secure our devices from all the malware or infected files which found over the internet network.  Firewall uses different packet filter method and gateways to secure information.  Its also secure internet by malware which are give by the user’s(while uploading files).
  • 5.
    Limitation-: • Firewalls cannotstop internal users from accessing websites with malicious code. • Cannot protect against internal threats. Ex- Disgruntled or colluding employees. • Cannot protect against transfer of all virus infected programs or files – because of huge range of O/S & file types.
  • 6.
    • Antivirus isa software to secure computer(devices) from all malware. • *Today Antivirus working as firewall also. Giving online payment security, intruder selfie, antispyware, real-time protection etc. Ex-: • Protogen • Avast • Avira etc. ANTIVIRUS
  • 7.
    MALWARE’S1.VIRUS-: These are theunwanted programs which are found commonly in any computer devices to damage the files or data.These are basically found in exicutable files. EX-: @echo off Shutdown.exe -s -t 10 cls msg * Sorry bro!
  • 8.
    2.TROJAN- This malware whichsteal user’s data help hacker(creator of trojan malware) or the government to track user’s location ,information and confidential data for their own purposes. 3.WORMS- This malware can replicate it self by one to many’s.This basically filled user’s memory from dumpied files. Its create multiple files and folder’s of same name’s and replicating but not infecting program. 4. RANSOMEWARE- This software basically encryped the user’s data and then the hacker wants the ransom money to decrypt the data.
  • 9.
    5.KEYLOGGER- This software workswhen the user’s uses the keyboard. This software records all the user keyboard word typed by the user. 6.GREYWARE- When user get infected by the Gayware malware, so they found the unwanted ads on the device screen .
  • 10.
    INTERNET OF THING’S Agroup of all the devices which are connect through a wireless connection and they can easily communicate with the without a human interaction in it. The concept was simple but powerful and introduce by Kevin Ashton In the early 2000’s. The Three C’s of IoT • Communication-: IoT communicates information to people and systems in a effective ways. • Control and Automation-: In a connected world, a business will have visibility into a device’s condition. In many cases, a business or consumer will also be able to remotely control a device. • Cost Savings-: Many companies will adopt IoT to save money. Measurement provides actual performance data and equipment health, instead of just estimates.
  • 11.