SlideShare a Scribd company logo
Introduction to Computer Science
2007-2008
Computer Security
and Risks
4626. Introd to Computer Science
Aims
• Describing several types of computer crime
• Describing the major security issues that
computer users have to face
• Describing how it affects to personal privacy
• Explaining the relationship between security
and computer reliability
4626. Introd to Computer Science
Crime accomplished through computer tech.
• widely extended: easiness of computer
usage
• most of them committed by company
insiders
• high cost: foresight + repair
Current threats
• spoofing (or phishing): identity theft
Computer Crime
4626. Introd to Computer Science
Software Piracy
• Illegal duplication of copyrighted software
• Reasons:
• price of software
• means to create copies
How many pirate programs do
you have?
4626. Introd to Computer Science
Authorship rights
Industrial property
Intellectual Property
• Privileges granted over intangible goods with
financial value
• They are defined over
• copyright
• commercial secret
• patents
• trademarks
• Software is covered by copyright
4626. Introd to Computer Science
Computer Sabotage
• Trojan horses
• Viruses
• Worms
Use of malware to spoil
hardware & software
4626. Introd to Computer Science
Trojans
• hidden inside programs that perform
useful tasks
• logic bombs: programmed to ‘attack’ in
response to a particular event (e.g. time
bombs)
• solutions
• software from reliable sources
(avoids)
• anti-trojan (detects)
• firewall -output- (blocks)
4626. Introd to Computer Science
Viruses
• as biological ones
• invade programs and use them to reproduce
themselves
• operative system specific
• solution:
• use carefully removable media (avoids)
• antivirus (detects and cleans)
4626. Introd to Computer Science
Worms
• as viruses: use computers to
reproduce themselves
• autonomous spread through
computer networks
• solution:
• email from confident sources
(avoids)
• firewall -input- (blocks)
• security patches
4626. Introd to Computer Science
Hacking
• Discovering and exploiting
computer system failures
• Reasons:
• curiosity
• intellectual challenge
• Cracking = criminal hacking
4626. Introd to Computer Science
Reducing Risks
• to work properly
• to guarantee access
to information only
to granted users
• to guarantee
privacy
Information systems have to be protected...
4626. Introd to Computer Science
Physical Access
Restrictions
• something you have (card)
• something you know (password)
• something you do (signature)
• something about you (scans)
Only authorised staff
have access to the equipment
Security checks based on…
How
can we protect
sensitive
information?
1. protect hw
UPS
• uninterruptible
power supply
• protects data
during power
failures (minutes)
• give users time
to switch off
the system
4626. Introd to Computer Science
Surge
protectors
• shield computers from power
spikes
• protect the computer from
physical damage
2. protect data
4626. Introd to Computer Science
Passwords
• which kind of password do you use?
• how frequently do you change your passwords?
• how many passwords do you use?
The most common tool,
but carefully chosen
Never use a word or your b-day!!
Firewalls
• guard against
unauthorised access
• blocks accessing ports for
input and output
• by hardware or software
4626. Introd to Computer Science
Encryption
• keys to code messages
and documents
• symmetric:
common key
• asymmetric:
public / private keys
4626. Introd to Computer Science
Audit Control SW
• Records computer
transactions
• Auditors can trace and
identify suspicious activities
2. replicate
4626. Introd to Computer Science
Backup Copies
• periodic copies of
important information
• for companies, it is
recommended that copies
be stored in a different
location
4626. Introd to Computer Science
RAID
• Redundant Array of
Independent Disks
• multiple disks as
one logical unit
• mirroring: data
redundancy

More Related Content

Similar to unit09-1212598883113378-9.pdf

Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of Things
Real-Time Innovations (RTI)
 
Fault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis ProtocolsFault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis Protocols
Riscure
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Inductive Automation
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Inductive Automation
 
Need for cybersecurity
Need for cybersecurityNeed for cybersecurity
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
Kaley Hair
 
Hardware Security Training By TONEX
Hardware Security Training By TONEXHardware Security Training By TONEX
Hardware Security Training By TONEX
Bryan Len
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
ShivaTyagi26
 
Day-4-Cyber-Analysis-Course_01152016.pptx
Day-4-Cyber-Analysis-Course_01152016.pptxDay-4-Cyber-Analysis-Course_01152016.pptx
Day-4-Cyber-Analysis-Course_01152016.pptx
XarCrystal
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
WPICPE
 
Software Basics
Software BasicsSoftware Basics
Software Basics
Miguel Rebollo
 
Ending the Tyranny of Expensive Security Tools: A New Hope
Ending the Tyranny of Expensive Security Tools: A New HopeEnding the Tyranny of Expensive Security Tools: A New Hope
Ending the Tyranny of Expensive Security Tools: A New Hope
Michele Chubirka
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 
Hardware basics: peripherals
Hardware basics: peripheralsHardware basics: peripherals
Hardware basics: peripherals
Miguel Rebollo
 
Computer Currents
Computer CurrentsComputer Currents
Computer Currents
Miguel Rebollo
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
newbie2019
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
Infosec
 

Similar to unit09-1212598883113378-9.pdf (20)

Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of Things
 
Fault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis ProtocolsFault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis Protocols
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
Need for cybersecurity
Need for cybersecurityNeed for cybersecurity
Need for cybersecurity
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Hardware Security Training By TONEX
Hardware Security Training By TONEXHardware Security Training By TONEX
Hardware Security Training By TONEX
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
Day-4-Cyber-Analysis-Course_01152016.pptx
Day-4-Cyber-Analysis-Course_01152016.pptxDay-4-Cyber-Analysis-Course_01152016.pptx
Day-4-Cyber-Analysis-Course_01152016.pptx
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Software Basics
Software BasicsSoftware Basics
Software Basics
 
Ending the Tyranny of Expensive Security Tools: A New Hope
Ending the Tyranny of Expensive Security Tools: A New HopeEnding the Tyranny of Expensive Security Tools: A New Hope
Ending the Tyranny of Expensive Security Tools: A New Hope
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Hardware basics: peripherals
Hardware basics: peripheralsHardware basics: peripherals
Hardware basics: peripherals
 
Computer Currents
Computer CurrentsComputer Currents
Computer Currents
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
 

Recently uploaded

ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
aymanquadri279
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 

Recently uploaded (20)

ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 

unit09-1212598883113378-9.pdf

  • 1. Introduction to Computer Science 2007-2008 Computer Security and Risks
  • 2. 4626. Introd to Computer Science Aims • Describing several types of computer crime • Describing the major security issues that computer users have to face • Describing how it affects to personal privacy • Explaining the relationship between security and computer reliability
  • 3. 4626. Introd to Computer Science Crime accomplished through computer tech. • widely extended: easiness of computer usage • most of them committed by company insiders • high cost: foresight + repair Current threats • spoofing (or phishing): identity theft Computer Crime
  • 4. 4626. Introd to Computer Science Software Piracy • Illegal duplication of copyrighted software • Reasons: • price of software • means to create copies How many pirate programs do you have?
  • 5. 4626. Introd to Computer Science Authorship rights Industrial property Intellectual Property • Privileges granted over intangible goods with financial value • They are defined over • copyright • commercial secret • patents • trademarks • Software is covered by copyright
  • 6. 4626. Introd to Computer Science Computer Sabotage • Trojan horses • Viruses • Worms Use of malware to spoil hardware & software
  • 7. 4626. Introd to Computer Science Trojans • hidden inside programs that perform useful tasks • logic bombs: programmed to ‘attack’ in response to a particular event (e.g. time bombs) • solutions • software from reliable sources (avoids) • anti-trojan (detects) • firewall -output- (blocks)
  • 8. 4626. Introd to Computer Science Viruses • as biological ones • invade programs and use them to reproduce themselves • operative system specific • solution: • use carefully removable media (avoids) • antivirus (detects and cleans)
  • 9. 4626. Introd to Computer Science Worms • as viruses: use computers to reproduce themselves • autonomous spread through computer networks • solution: • email from confident sources (avoids) • firewall -input- (blocks) • security patches
  • 10. 4626. Introd to Computer Science Hacking • Discovering and exploiting computer system failures • Reasons: • curiosity • intellectual challenge • Cracking = criminal hacking
  • 11. 4626. Introd to Computer Science Reducing Risks • to work properly • to guarantee access to information only to granted users • to guarantee privacy Information systems have to be protected...
  • 12. 4626. Introd to Computer Science Physical Access Restrictions • something you have (card) • something you know (password) • something you do (signature) • something about you (scans) Only authorised staff have access to the equipment Security checks based on…
  • 15. UPS • uninterruptible power supply • protects data during power failures (minutes) • give users time to switch off the system
  • 16. 4626. Introd to Computer Science Surge protectors • shield computers from power spikes • protect the computer from physical damage
  • 18. 4626. Introd to Computer Science Passwords • which kind of password do you use? • how frequently do you change your passwords? • how many passwords do you use? The most common tool, but carefully chosen Never use a word or your b-day!!
  • 19. Firewalls • guard against unauthorised access • blocks accessing ports for input and output • by hardware or software
  • 20. 4626. Introd to Computer Science Encryption • keys to code messages and documents • symmetric: common key • asymmetric: public / private keys
  • 21. 4626. Introd to Computer Science Audit Control SW • Records computer transactions • Auditors can trace and identify suspicious activities
  • 23. 4626. Introd to Computer Science Backup Copies • periodic copies of important information • for companies, it is recommended that copies be stored in a different location
  • 24. 4626. Introd to Computer Science RAID • Redundant Array of Independent Disks • multiple disks as one logical unit • mirroring: data redundancy