0% found this document useful (0 votes)
233 views10 pages

Prepared By: Binay Tiwari

Computer Security Prepared By : Binay Tiwari Outline ‡ ‡ ‡ ‡ ‡ IS Vulnerability Types of Computer Crime Computer Security Computer Security Requirements Computer Crime by UnAuthorized Users. ‡ Potentially Malicious computer Programs. IS Vulnerability ‡ ‡ ‡ ‡ ‡ ‡ ‡ Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK Types of Computer C

Uploaded by

Binay Tiwari
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
233 views10 pages

Prepared By: Binay Tiwari

Computer Security Prepared By : Binay Tiwari Outline ‡ ‡ ‡ ‡ ‡ IS Vulnerability Types of Computer Crime Computer Security Computer Security Requirements Computer Crime by UnAuthorized Users. ‡ Potentially Malicious computer Programs. IS Vulnerability ‡ ‡ ‡ ‡ ‡ ‡ ‡ Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK Types of Computer C

Uploaded by

Binay Tiwari
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 10

Computer Security

Prepared By : Binay Tiwari


Outline
• IS Vulnerability
• Types of Computer Crime
• Computer Security
• Computer Security Requirements
• Computer Crime by UnAuthorized
Users.
• Potentially Malicious computer Programs.
IS Vulnerability
• Financial institutions and banks
• Internet service providers
• Pharmaceutical companies
• Government and defense agencies
• Contractors to various government agencies
• Multinational corporations
• ANYONE ON THE NETWORK
Types of Computer Crimes
• Hacking
• Phishing
• Computer Viruses
• Cyber stalking
• Identity Theft
Computer Security
• Computer security is a branch of technology
known as information security as applied to
computers and networks.
• . The objective of computer security includes
protection of information and property from
theft, corruption, or natural disaster, while
allowing the information and property to remain
accessible and productive to its intended users
Computer Security Requirements
• Secrecy
• Integrity
• Availability
• Authenticity
• Non-repudiation
• Access control
Potentially Malicious computer
Programs
Malicious Software-malware
Viruses
Worms
Trojans
Computer Crime Through
Unauthorized access
• Social Engineering
• Cracking Passwords
THANK YOU

You might also like