SlideShare a Scribd company logo
INTRODUCTION OF COMPUTER
SECURITY
COMPUTER SECRITY
o Computer and network security was not at all well
known,even about 12 years ago
o Today ,it is something everyone is aware of the need ,but nit
sure what is really means
o Interesting topic of threads ,counter measures
risks,stories,events and paranoia
MEDIA STORIES
o Consumers are bombarded with media reports narrating
dangers of the online world
o IDENTITY THEFT
o EMBEZZIEMENT AND FRAUD
o CREDIT CARD THEFT
o CORPORATE LOSS
GOALS OF COMPUTER SECURITY
o INTEGRITY
o Guarantee that the data is what we except
o CONFIDENTIALITY
o The information must just be accessible to the
authorized people
o RELIABILITY
o Computer should work without having unexpected
problems
o AUTHENTICATION
o Guarantee that only authorized persons can access to
the resource
SECURITY BASICS
WHAT DOES IT MEANS TO BE SECURE ????
o “Include protection of information from theft or corruption
or the preservation of availability as defined in the security
policy.”
o TYPES OF SECURITY
o Network security
o System and software security
o Physical security
o Software cannot protect software (may be hardware can )
o Networks can be protected better than software
SOME OF TYPES ATTACK
SOME COMMON ATTACKS
Network attacks
o Packet sniffing man –in –the middle, DNS hacking
Web attacks
o Phishing , SQL injection ,cross site scripting
OS , Application and software attacks
o Virus , trojans , worms , rootkits , buffer overflow
Social Engineering
o (NOT social networking)
NETWORK ATTACKS
o PACKET SNIFFING
o Internet traffic consists of the data “PACKETS” an
these can be “SNIFFED”
o Leads to other attacks such as password sniffing
,cookie stealing session hijacking information
technology
o MAN IN THE MIDDLE
o Insert a router in the path between client and server
and change the packet as they pass through
o DNS HIJACKING
o Insert malicious routers in DNS tablets TO send
traffic for genuine sites to malicious sites
WEB ATTACKS
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Ad

More Related Content

What's hot (20)

Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
toamma
 
Network security
Network securityNetwork security
Network security
Nkosinathi Lungu
 
Network security
Network securityNetwork security
Network security
Jasleen Kaur (Chandigarh University)
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
hazirma
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
Ana Meskovska
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
AfiqEfendy Zaen
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Network Security
Network SecurityNetwork Security
Network Security
Joe Baker
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
Srinu Potnuru
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
hassanmughal4u
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
Vikram Khanna
 
Hardware Security
Hardware SecurityHardware Security
Hardware Security
Mani Rathnam
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
joy grace bagui
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
AditiPatni3
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
hamzakareem2
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
Pankaj Jha
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
toamma
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
hazirma
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
Ana Meskovska
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
AfiqEfendy Zaen
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Network Security
Network SecurityNetwork Security
Network Security
Joe Baker
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
Srinu Potnuru
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
hassanmughal4u
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
Vikram Khanna
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
joy grace bagui
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
AditiPatni3
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
hamzakareem2
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
Pankaj Jha
 

Similar to Introduction of computer security (20)

E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
S.M. Towhidul Islam
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
Jetking
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
ACIT Education Pvt Ltd
 
Network security
Network securityNetwork security
Network security
toamma
 
Internet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security ConcernsInternet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security Concerns
Akshay Jain
 
Dos and Dont to be followed to protect information and technology
Dos and Dont to be followed  to protect information and technologyDos and Dont to be followed  to protect information and technology
Dos and Dont to be followed to protect information and technology
ssuser3baba2
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
online Marketing
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
Iaetsd Iaetsd
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
Taniya Fansupkar
 
Network Security
Network SecurityNetwork Security
Network Security
Puneet Abichandani
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
cyber security services | MasGlobal Services
cyber security services | MasGlobal Servicescyber security services | MasGlobal Services
cyber security services | MasGlobal Services
Mas Global Services
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
Gryffin EJ
 
Cyber Security G4.pptx it gives ; little
Cyber Security G4.pptx it gives ; littleCyber Security G4.pptx it gives ; little
Cyber Security G4.pptx it gives ; little
NagendraKarukuriRedd
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
hdbundo
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
ssuser84f16f
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
zaarahary
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
S.M. Towhidul Islam
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
Jetking
 
Network security
Network securityNetwork security
Network security
toamma
 
Internet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security ConcernsInternet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security Concerns
Akshay Jain
 
Dos and Dont to be followed to protect information and technology
Dos and Dont to be followed  to protect information and technologyDos and Dont to be followed  to protect information and technology
Dos and Dont to be followed to protect information and technology
ssuser3baba2
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
online Marketing
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
Iaetsd Iaetsd
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
cyber security services | MasGlobal Services
cyber security services | MasGlobal Servicescyber security services | MasGlobal Services
cyber security services | MasGlobal Services
Mas Global Services
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
Gryffin EJ
 
Cyber Security G4.pptx it gives ; little
Cyber Security G4.pptx it gives ; littleCyber Security G4.pptx it gives ; little
Cyber Security G4.pptx it gives ; little
NagendraKarukuriRedd
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
hdbundo
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
ssuser84f16f
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
zaarahary
 
Ad

Introduction of computer security

  • 2. COMPUTER SECRITY o Computer and network security was not at all well known,even about 12 years ago o Today ,it is something everyone is aware of the need ,but nit sure what is really means o Interesting topic of threads ,counter measures risks,stories,events and paranoia
  • 3. MEDIA STORIES o Consumers are bombarded with media reports narrating dangers of the online world o IDENTITY THEFT o EMBEZZIEMENT AND FRAUD o CREDIT CARD THEFT o CORPORATE LOSS
  • 4. GOALS OF COMPUTER SECURITY o INTEGRITY o Guarantee that the data is what we except o CONFIDENTIALITY o The information must just be accessible to the authorized people o RELIABILITY o Computer should work without having unexpected problems o AUTHENTICATION o Guarantee that only authorized persons can access to the resource
  • 5. SECURITY BASICS WHAT DOES IT MEANS TO BE SECURE ???? o “Include protection of information from theft or corruption or the preservation of availability as defined in the security policy.” o TYPES OF SECURITY o Network security o System and software security o Physical security o Software cannot protect software (may be hardware can ) o Networks can be protected better than software
  • 6. SOME OF TYPES ATTACK SOME COMMON ATTACKS Network attacks o Packet sniffing man –in –the middle, DNS hacking Web attacks o Phishing , SQL injection ,cross site scripting OS , Application and software attacks o Virus , trojans , worms , rootkits , buffer overflow Social Engineering o (NOT social networking)
  • 7. NETWORK ATTACKS o PACKET SNIFFING o Internet traffic consists of the data “PACKETS” an these can be “SNIFFED” o Leads to other attacks such as password sniffing ,cookie stealing session hijacking information technology o MAN IN THE MIDDLE o Insert a router in the path between client and server and change the packet as they pass through o DNS HIJACKING o Insert malicious routers in DNS tablets TO send traffic for genuine sites to malicious sites