Computer Security
Prepared By : Binay Tiwari
Outline
IS Vulnerability Types of Computer Crime Computer Security Computer Security Requirements Computer Crime by UnAuthorized Users. Potentially Malicious computer Programs.
IS Vulnerability
Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK
Types of Computer C
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
233 views10 pages
Prepared By: Binay Tiwari
Computer Security
Prepared By : Binay Tiwari
Outline
IS Vulnerability Types of Computer Crime Computer Security Computer Security Requirements Computer Crime by UnAuthorized Users. Potentially Malicious computer Programs.
IS Vulnerability
Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK
Types of Computer C
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 10
Computer Security
Prepared By : Binay Tiwari
Outline • IS Vulnerability • Types of Computer Crime • Computer Security • Computer Security Requirements • Computer Crime by UnAuthorized Users. • Potentially Malicious computer Programs. IS Vulnerability • Financial institutions and banks • Internet service providers • Pharmaceutical companies • Government and defense agencies • Contractors to various government agencies • Multinational corporations • ANYONE ON THE NETWORK Types of Computer Crimes • Hacking • Phishing • Computer Viruses • Cyber stalking • Identity Theft Computer Security • Computer security is a branch of technology known as information security as applied to computers and networks. • . The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users Computer Security Requirements • Secrecy • Integrity • Availability • Authenticity • Non-repudiation • Access control Potentially Malicious computer Programs Malicious Software-malware Viruses Worms Trojans Computer Crime Through Unauthorized access • Social Engineering • Cracking Passwords THANK YOU