Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Computer security basics


Published on

Published in: Technology
  • Be the first to comment

Computer security basics

  1. 1. Introduction to Computer security By, P.srinu 24
  2. 2. COMPUTER SECURITY Why?:to protect the computing system and protect the data that they store and access  Security attacks :- actions that comprises the computer security  Security mechanisms:-tools such as algorithms, protocols designed to detect ,prevent or recover from a security attack  Security services :-specific kind of protection to the system resources
  3. 3. SECURITY THREAT • Threat potential violation of security and also causes harm. • Vulnerability a weakness that is left unprotected.
  4. 4. SECURITY ATTACK Passive attack:getting information from the system ,but it does not affect the system.  analyzing the traffic to find the nature of communication  difficult to detect as they do not involve alteration of the data  Hence better to Prevent rather than Detection
  5. 5. Active Attack: tries to alter the system resources or affect its operations.  Masquerade  replay(capture events and replay)  Modifications of messages  Denial of services “Difficult to prevent but can be detected and recovered “
  6. 6. TARGET users • identity • privacy of user » identification number) of atm,credit card, login id’s, pass codes How ?? tracking of users habits and actions What?? Cookies(cannot install malware) and spam mails are used for attacking
  7. 7. Attacks on computer hardware • Natural calamities such as Floods, Earthquakes, power fluctuations. • Destructive actions of burglars or people
  8. 8. Attacks on software Aim? to harm the data stored and programs in computer how?? Executables files:- programs written to do harm rather than good What?? malicious software :-a software code included into the system which is harmful in nature Hacking:-intruding into another computer or network to perform an illegal act
  9. 9. MALICIOUS SOFTWARE A software program which is Destructive in nature. Characteristics  can attach itself to other healthy programs.  replicates itself and thus can spread across a network  Infects an executable file or program  Cannot infect write protect disks , hardware, compressed files How dies it harm? • Corrupt or delete data, change functionality of software , erase everything on the hard disk, degrade the system performance. What??  E mail attachment, downloads on internet. Eg. I love you, melissa,Brain, anna kournikova………. VIRU S
  10. 10. Java scripts ,java applets and Activex controls • Java applets :- it can be part of a web page and executed by the Java Virtual Machine executed by browsers for many platforms, including Microsoft Windows ,Unix, Linux etc. • ActiveX controls:- similar to java applets but do not have security checks • Java scripts:-a scripting language commonly implemented as part of a web browser in order to create enhanced user interfaces and dynamic websites
  11. 11. WORMS • Self replicating software that uses network and security holes • it scans the network of a system and copies itself and then starts replicating from there. • Worm and virus are different • Consumes the resources like bandwidth of computer and makes it slow. E.g. nimda(multiple infectious virus), code red (Chinese),
  12. 12. TROJAN HORSE • It is a destructive program that masquerade as useful program.
  13. 13. • The reason behind the name is the Greek soldiers who reached the city of troy by hiding in the wooden horse. Similarly games, software etc. can corrupt Data, Programs or damage files
  14. 14. ???queries???