0% found this document useful (0 votes)
91 views

Computer Security

Computer security, also known as cyber security, involves protecting computer systems and networks from unauthorized access and harm. It aims to secure devices like personal computers, servers, smartphones and IoT devices as well as the networks and data they transmit. Common threats include denial of service attacks, hacking by directly accessing systems, eavesdropping on private communications, spoofing identities and tampering with software. Understanding these attack types helps secure systems from digital threats.

Uploaded by

Trixia Mortiz
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views

Computer Security

Computer security, also known as cyber security, involves protecting computer systems and networks from unauthorized access and harm. It aims to secure devices like personal computers, servers, smartphones and IoT devices as well as the networks and data they transmit. Common threats include denial of service attacks, hacking by directly accessing systems, eavesdropping on private communications, spoofing identities and tampering with software. Understanding these attack types helps secure systems from digital threats.

Uploaded by

Trixia Mortiz
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

 Computers Security, also known

as Cyber Security, is the security


practices applied to the information
systems and infrastructure, networks
and data stored or transmitted over
them. Modern society reliance and
dependence on computer systems has
promoted the growth of this field.
 Computer systems include a wide
range of devices and their connecting
networks. Some examples include
data centers, servers, personal
computers, smart devices,
smartphones, Internet of
Things, Internet, private networks, Wi-
Fi networks, Bluetooth, etc.
 Computer security involves the set of
processes applied to digital equipment,
information and services to protect them
from unintended or unauthorized access or
destruction.

 In the modern society new actors appeared,


called cyber criminals, which developed
illegal practices that exploit systems
vulnerabilities for identity theft or other
digital criminal activities. In order to secure
computer systems, it is necessary to
understand the various types of possible
“attacks” that can be made against it. The
digital attacks are also known as hacks.
 Backdoors: Secret methods of bypassing
authentication or controls.

 Denial-of-Service (DoS): Denial of service attacks


make a physical resources or network unavailable
to its intended use. Several categories of DoS are
designed for different purposes. DoS can be
personal or network wide. A common example
consists of sending trash request to network
ports until the physical machine collapse all its
processing power just replying to trash
messages.
 Direct Access Hacks: Accessing directly to
someone’s (person or organization) digital
system and compromising information.

 Eavesdropping (Man in the Middle):


This attack consists of listening to private
conversations between hosts in a network
and compromising sensitive information.

 Spoofing: This technique consist of


masquerading as another person (or
program) and falsify data.
 Tampering: Malicious modifications to
software that generates malfunctions or other
vulnerabilities that can be breached with
other methods.

 Repudiation: Challenging digital signatures.

 Information Disclosure: Release of sensitive


information in an untrusted environment.
The Cyber Security PowerPoint
Template will provide the user
with professional clipart and
backgrounds to create amazing
cyber presentations. Ideal for
Security and IT Managers, the
template is 100% editable.

You might also like