This document discusses basic security concepts and threats to computer systems. It describes what threats are, including vulnerabilities, and how security attempts to neutralize threats. It outlines different types of threats including threats to users such as loss of privacy from data collection and tracking, as well as threats to data like viruses, Trojan horses, hacking, and cybercrime. The document also discusses countermeasures to threats like anti-virus software, firewalls, and passwords. It provides examples of common types of viruses and how they spread, as well as functions of antivirus software to detect and remove viruses and malware.
Computer security threats & prevention,Its a proper introduction about computer security and threats and prevention with reference. Have info about threats and their prevention.
Computer , Internet and physical security.Ankur Kumar
It refers to protection of a computer and the information stored in it, from the unauthorised users.
Computer security is a branch of computer technology known as information security as applied to computers and networks.
Computer security threats & prevention,Its a proper introduction about computer security and threats and prevention with reference. Have info about threats and their prevention.
Computer , Internet and physical security.Ankur Kumar
It refers to protection of a computer and the information stored in it, from the unauthorised users.
Computer security is a branch of computer technology known as information security as applied to computers and networks.
A brief presentation over computer viruses, which is presently ignored by most computer users.
Made by Utkarsh Srivastava for college 'routine task' purpose!
TEDx Manchester: AI & The Future of WorkVolker Hirsch
TEDx Manchester talk on artificial intelligence (AI) and how the ascent of AI and robotics impacts our future work environments.
The video of the talk is now also available here: https://youtu.be/dRw4d2Si8LA
A Simple Presentation about Computer Security and Anti Viruses keeping in mind healthcare professionals as the target audience. Contains Definitions, Educational Content , Purchase and Free Options and a Simple tutorial on How to use Avast Free Edition
This lecture includes introduction to computers security and privacy. This lecture include basic concepts of terminologies and technologies involve in current securities and privacy needs.
we have made this like computer application course material which is so functionable and any one can use it to develop your technological concept skill.
We Belete And Tadelech
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Viruses (Lecture) IT Slides # 3
1. 14A-1
Basic Security Concepts
• What is a threats?
– Anything that can harm a computer
– Vulnerabilities are weaknesses in security
– Security attempts to neutralize threats
2. 14A-2
Basic Security Concepts
• Degrees of harm
– Level of potential damage
– Include all parts of system
• Potential data loss
• Loss of privacy
• Inability to use hardware
• Inability to use software
3. 14A-3
Basic Security Concepts
• Countermeasures
– Steps taken to block a threat
– Protect the data from theft
– Protect the system from theft
4. 14A-4
Threats To Users
• 1. Loss of privacy
– Personal information is stored electronically
– Purchases are stored in a database
• Data is sold to other companies
– Public records on the Internet
– Internet use is monitored and logged
– None of these techniques are illegal
5. 14A-5
Threats to Users
• 2. Cookies
– A cookie is information that a Web site puts
on your hard disk so that it can remember
something about you at a later time.
– Cookies now track history and passwords
– Browsers include cookie blocking tools
6. 14A-6
Threats to Users
• 3. Spyware
– Software downloaded to a computer
– Designed to record personal information
– Typically undesired software
– Hides from users
– Several programs exist to eliminate
7. 14A-7
Threats to Users
• 4. Web bugs
– Small programs embedded in gif images
– A Web bug, also known as a Web beacon,
is a file object (usually a graphic image
such as a transparent GIF) that is placed
on a Web page or in an e-mail message to
monitor user behavior.
– Gets around cookie blocking tools
– Companies use to track usage
8. 14A-8
Threats to Users
• 5. Spam
– Unsolicited commercial email
– Irrelevant or unsolicited messages sent
over the Internet, typically to large numbers
of users, for the purposes of advertising,
phishing, spreading malware, etc.
– Networks and PCs need a spam blocker
• Stop spam before reaching the inbox
– Spammers acquire addresses using many
methods
9. 14A-9
Threats to Data
• The most serious threat
– Data is the reason for computers
– Data is very difficult to replace
– Protection is difficult
• Data is intangible
10. 14A-10
Threats to Data
• Viruses
– Software that distributes and installs itself
– Ranges from annoying to catastrophic
– Countermeasures
• Anti-virus software
• Popup blockers
• Do not open unknown email
11. 14A-11
Threats to Data
• Trojan horses
– Program that poses as beneficial software
– Not an actual virus but a loophole to cause
virus.
– User willingly installs the software
– Countermeasures
• Anti-virus software
• Spyware blocker
12. 14A-12
Threats to Data
• Cybercrime
– Using a computer in an illegal act
– Fraud and theft are common acts
13. 14A-13
Threats to Data
• Internet fraud
– Most common cybercrime
– Fraudulent website
– Have names similar to legitimate sites
14. 14A-14
Threats to Data
• Hacking
– Using a computer to enter another network
– Cost users $1.3 trillion in 2003
– Hackers motivation
• Recreational hacking
• Financial hackers
• Grudge hacking
– Hacking methods
• Sniffing
• Social engineering
• Spoofing
15. Computer virus
• Computer viruses are small software
programs that are designed to spread from
one computer to another and to interfere with
computer operation.
• A virus might corrupt or delete data on your
computer, use your e-mail program to spread
itself to other computers, or even erase
everything on your hard disk.
• Computer viruses are often spread by
attachments in e-mail messages or instant
messaging messages
14A-15
16. Causes of Computer virus
• Virus infection in computers can be
caused through different means. Below
are the commonest causes of Computer
Virus attack.
Through the internet
Through email attachment
Through removable storage devices
Through Bluetooth transfer
14A-16
17. Most Common Types of Viruses
• 1. Resident Viruses
• This type of virus is a permanent which
resides in the RAM memory. From there
it can overcome and interrupt all of the
operations executed by the system:
corrupting files and programs that are
opened, closed, copied, renamed etc.
14A-17
18. 2. Boot Virus
• This type of virus affects the boot sector of a floppy or
hard disk. This is a crucial part of a disk, in which
information on the disk itself is stored together with a
program that makes it possible to boot (start) the
computer from the disk.
The best way of avoiding boot viruses is to ensure
that floppy disks are write-protected and never start
your computer with an unknown floppy disk in the disk
drive.
14A-18
19. 3. Overwrite Viruses
• Virus of this kind is characterized by the fact that it
deletes the information contained in the files that it
infects, rendering them partially or totally useless
once they have been infected.
The only way to clean a file infected by an overwrite
virus is to delete the file completely, thus losing the
original content.
14A-19
20. 4. Directory Virus
• Directory viruses change the paths that indicate the
location of a file. By executing a program (file with the
extension .EXE or .COM) which has been infected by
a virus, you are unknowingly running the virus
program, while the original file and program have
been previously moved by the virus.
Once infected it becomes impossible to locate the
original files.
14A-20
21. 5. File infectors
•
This type of virus infects programs or executable files
(files with an .EXE or .COM extension). When one of
these programs is run, directly or indirectly, the virus
is activated, producing the damaging effects it is
programmed to carry out. The majority of existing
viruses belongs to this category, and can be classified
depending on the actions that they carry out.
14A-21
22. Antivirus
• Anti-virus software is a program or set of
programs that are designed to prevent,
search for, detect, and remove software
viruses, and other malicious software
infections like worms, Trojans and more.
• McAfee
• ESET NOD32
• Avast
• Avira
14A-22
23. Functions of Antivirus
• Scan specific files or directories for any malware or
known malicious patterns
• Allow you to schedule scans to automatically run for
you
• Allow you to initiate a scan of a specific file or of your
computer, or of a CD or flash drive at any time.
• Remove any malicious code detected –sometimes
you will be notified of an infection and asked if you
want to clean the file, other programs will
automatically do this behind the scenes.
• Show you the ‘health’ of your computer
14A-23
24. PASSWORD
• Password is a secret word that is used to protect a
computer system or program. It may consist of
numbers, alphabets or both. The user has to type the
password to access the computer system.
• Examples:-
Every computer provides an option for setting
password. If the computer is protected with password,
it will ask for that password to login.
Email facility on the internet is also protected with
password. Every user has to give email ID and
password to check emails.
14A-24
25. Purpose of password
• The purpose of password is to protect
data stored on a computer.
• It protects data from being lost,
misused or deleted by any person.
• The system can be accessed by a
person who knows the password.
14A-25
26. Tricks for obtaining password
• There are two essential password rules to
consider when creating a password for the
first time
• – length and complexity.
• Your password length should be at least 8
characters long
• Your password should use a combination of
lower case letters, upper case letters,
numbers, and special characters
14A-26
Teaching tip
It is important to note that no countermeasure is 100% effective all of the time. For proof, discuss an instance of a locked car being stolen. A truly dedicated attacker will eventually break through any security.
Teaching tip
Cookies are named after the ‘magic cookie’.
Teaching tip
More information regarding web bugs can be found at en.wikipedia.org/wiki/Web_bug.
Teaching tip
Spam is rumored to be named in honor of the Monty Python skit, Spam!. In the skit, a customer is forced to select spam in his lunch. Much like we are forced to accept a spam message. Visit www.detritus.org/spam/skit.html for the entire spam skit.
Discussion point
Spam is one topic that nearly everyone in the class can relate to. Have your students think about spam from the other side. Have them consider the point of view of the self proclaimed ‘Spam King’, Scott Richter. For some conversation fodder visit www.pcworld.com/news/article/0,aid,116807,00.asp.
Teaching tip
For information on specific viruses visit securityresponse.Symantec.com/.
Teaching tip
Detailed information regarding the protection from viruses, see the Computing keynote at the end of the chapter.
Teaching tip
Ad Aware is sold by LavaSoft. The homepage is www.lavasoftusa.com/software/adaware/. Spybot is a product of Patrick M. Kolla. The true website is www.safer-networking.org/en/index.html.