SlideShare a Scribd company logo
BASIC CONCEPTS IN
COMPUTER SECURITY
ARZATH AREEFF
WHAT IS COMPUTER SECURITY?
•Computer security is refers to techniques for
ensuring that data stored in a computer cannot
be read or compromised by any individuals
without authorization.
•Most computer security measures involve data
encryption and passwords.
•The purpose of computer security is to device
ways to prevent the weaknesses from being
WHAT IS COMPUTER SECURITY?
•We are addressing three important aspects of
any computer-related system such as
confidentiality, integrity, and availability.
WHAT IS COMPUTER SECURITY?
•These are the three goals in
computing Security.
1.Confidentiality
2.Integrity
3.Availability
THREE GOALS IN COMPUTING SECURITY
•Confidentiality: ensures that computer-related
assets are accessed only by authorized parties.
Confidentiality is sometimes
called secrecy or privacy.
•Integrity: it means that assets can be modified
only by authorized parties or only in authorized
ways.
•Availability: it means that assets are accessible
THREE GOALS IN COMPUTING SECURITY
•One of the challenges in building
a secure system is finding the right balance
among the goals, which often conflict.
VULNERABILITY
•Vulnerability is a weakness in the security
system.
•Weaknesses can appear in any element of a
computer, both in the hardware, operating
system, and the software.
The types of vulnerabilities we might find as
they apply to the assets of hardware, software,
and data.
•These three assets and the connections among
HARDWARE VULNERABILITY
•Hardware is more visible than software, largely
because it is composed of physical objects.
•it is rather simple to attack by adding devices,
changing them, removing them, intercepting the
traffic to them, or flooding them with traffic
until they can no longer function.
HARDWARE VULNERABILITY
•other ways that computer hardware can be
attacked physically.
•Computers have been drenched with water,
burned, frozen, gassed, and electrocuted with
power surges.
SOFTWARE VULNERABILITIES
•Software can be replaced, changed, or
destroyed maliciously, or it can be modified,
deleted, or misplaced accidentally. Whether
intentional or not, these attacks exploit the
software’s vulnerabilities.
SOFTWARE VULNERABILITIES
•Sometimes, the attacks are obvious, as when
the software no longer runs. More subtle are
attacks in which the software has been altered
but seems to run normally.
DATA VULNERABILITY
•a data attack is a more widespread and serious
problem than either a hardware or software
attack.
•data items have greater public value than
hardware and software because more people
know how to use or interpret data.
THREATS
•A threat to a computing system is a set of
circumstances that has the potential to cause
loss or harm.
•There are many threats to a computer system,
including human-initiated and computer-
initiated ones.
•A threat is blocked by control of a vulnerability.
•We can view any threat as being one of four
THREATS
•An interception means that
some unauthorized party has
gained access to an asset.
The outside party can be a
person, a program, or a
computing system.
THREATS
•In an interruption is an asset of the system
becomes lost, unavailable, or unusable.
THREATS
•If an unauthorized party not only accesses but
tampers with an asset, is called as
a modification.
THREATS
•An unauthorized party might create
a fabrication of counterfeit objects on a
computing system.
•The intruder may insert spurious transactions
to a network communication system or add
records to an existing database.
ATTACKS
•A human who exploits a vulnerability
perpetrates an attack on the system. An attack
can also be launched by another system, as
when one
•system sends an overwhelming set of messages
to another, virtually shutting down the second
system's ability to function.
ATTACKS
•Unfortunately, we have seen this type of attack
frequently, as denial-of-service attacks flood
servers with more messages than they can
handle.
CONTROL
•The control is an action, device, procedure or
technique that removes or reduces a
vulnerability.
•We use a control as a protective measure.
•There are so many ways to controle.
HOW TO SECURE THE COMPUTER
•There are two ways
1.Physical secure
2.Other secure methods
PHYSICALLY SECURE COMPUTERS
•Obtain physical
computer locks for all
your computers
PHYSICALLY SECURE COMPUTERS
•Attach mobile
proximity alarms to
your computers.
PHYSICALLY SECURE COMPUTERS
•Store computers in an
area with secure access.
•Or place the computers in
a locked room
PHYSICALLY SECURE COMPUTERS IN
YOUR COLLEGE
•Station security guards at
entry points to the college
building.
PHYSICALLY SECURE COMPUTERS IN
YOUR COLLEGE
•Verify windows and
doors are properly
locked after office
hours.
SECURE THE COMPUTER
•Choose a good secured
operating system
SECURE THE COMPUTER
•Choose a web browser
based on its security and
vulnerabilities because
most malware will come
through via your web
browser
SECURE THE COMPUTER
•When setting up, use
strong passwords in your
user account, router
account etc. Hackers may
use dictionary attacks and
brute force attacks.
SECURE THE COMPUTER
•When downloading
software (including
antivirus software), get it
from a trusted source
SECURE THE COMPUTER
•Install good antivirus
software because Antivirus
software is designed to
deal with modern malware
including viruses, Trojans,
key loggers, rootkits, and
worms.
SECURE THE COMPUTER
•Download and install a
firewall
SECURE THE COMPUTER
•Close all ports. Hackers
use port scanning
(Ubuntu Linux has all
ports closed by default)
SOURCES AND CITATIONS
• Security in Computing, Fourth EditionBy Charles P. Pfleeger
• http://lifehacker.com/5848296/how-do-i-keep-my-computer-secure-at-the-office
• http://it.ojp.gov/documents/asp/disciplines/section1-2.htm
• http://www.pcpro.co.uk/blogs/2011/01/21/how-to-physically-secure-your-business-
hardware/
• http://www.us-cert.gov/nav/nt01/
• http://blog.chromium.org/2008/10/new-approach-to-browser-security-google.html
• http://www.avast.com
• http://www.trendsecure.com
• http://www.lavasoft.com
• http://www.zonealarm.com
• http://www.personalfirewall.comodo.com/
• http://www.remote-exploit.org/backtrack.html
• http://www.grc.com/securitynow.htm
• http://www.hackerhighschool.org/
• http://www.symantec.com/norton/products/library/article.jsp?aid=internet_iq
THANK YOU
HAVE A SECURED
WORLD 
Ad

More Related Content

What's hot (20)

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
CAS
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
Rubal Sagwal
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
kelsports
 
Malicious software
Malicious softwareMalicious software
Malicious software
Dr.Florence Dayana
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
elmuhammadmuhammad
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
vasanthimuniasamy
 
Web security
Web securityWeb security
Web security
Muhammad Usman
 
Computer security and
Computer security andComputer security and
Computer security and
Rana Usman Sattar
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
Ali Habeeb
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
CAS
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
Rubal Sagwal
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
kelsports
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
elmuhammadmuhammad
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
vasanthimuniasamy
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
Ali Habeeb
 

Similar to Basic concepts in computer security (20)

OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
RohitK71
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
miki304759
 
Information Security basic introduction by professor
Information Security basic introduction by professorInformation Security basic introduction by professor
Information Security basic introduction by professor
adityakatare35
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
swapneel07
 
security introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptxsecurity introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptx
nagwaAboElenein
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
rahulkumarcscsf21
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
maqib8373
 
Lecture 9 Computer Security IN aict.pptx
Lecture 9 Computer Security IN aict.pptxLecture 9 Computer Security IN aict.pptx
Lecture 9 Computer Security IN aict.pptx
iafaaqanwar
 
Computer Security update and virus .pptx
Computer Security  update and virus .pptxComputer Security  update and virus .pptx
Computer Security update and virus .pptx
lnatanzenebe21
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
limsh
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating system
Maxwell Musonda
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
AAU Chapter 5.pptxpppppppppppppppppppppppt
AAU Chapter 5.pptxppppppppppppppppppppppptAAU Chapter 5.pptxpppppppppppppppppppppppt
AAU Chapter 5.pptxpppppppppppppppppppppppt
AYNETUTEREFE1
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
 
203135 Muhammad Usama.pptx
203135 Muhammad Usama.pptx203135 Muhammad Usama.pptx
203135 Muhammad Usama.pptx
muhammadusama257191
 
Computer Security
Computer SecurityComputer Security
Computer Security
AkNirojan
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
selvapriyabiher
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
RohitK71
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
miki304759
 
Information Security basic introduction by professor
Information Security basic introduction by professorInformation Security basic introduction by professor
Information Security basic introduction by professor
adityakatare35
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
swapneel07
 
security introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptxsecurity introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptx
nagwaAboElenein
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
rahulkumarcscsf21
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
maqib8373
 
Lecture 9 Computer Security IN aict.pptx
Lecture 9 Computer Security IN aict.pptxLecture 9 Computer Security IN aict.pptx
Lecture 9 Computer Security IN aict.pptx
iafaaqanwar
 
Computer Security update and virus .pptx
Computer Security  update and virus .pptxComputer Security  update and virus .pptx
Computer Security update and virus .pptx
lnatanzenebe21
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
limsh
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating system
Maxwell Musonda
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
AAU Chapter 5.pptxpppppppppppppppppppppppt
AAU Chapter 5.pptxppppppppppppppppppppppptAAU Chapter 5.pptxpppppppppppppppppppppppt
AAU Chapter 5.pptxpppppppppppppppppppppppt
AYNETUTEREFE1
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
 
Computer Security
Computer SecurityComputer Security
Computer Security
AkNirojan
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
Ad

Recently uploaded (20)

AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Ad

Basic concepts in computer security

  • 1. BASIC CONCEPTS IN COMPUTER SECURITY ARZATH AREEFF
  • 2. WHAT IS COMPUTER SECURITY? •Computer security is refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. •Most computer security measures involve data encryption and passwords. •The purpose of computer security is to device ways to prevent the weaknesses from being
  • 3. WHAT IS COMPUTER SECURITY? •We are addressing three important aspects of any computer-related system such as confidentiality, integrity, and availability.
  • 4. WHAT IS COMPUTER SECURITY? •These are the three goals in computing Security. 1.Confidentiality 2.Integrity 3.Availability
  • 5. THREE GOALS IN COMPUTING SECURITY •Confidentiality: ensures that computer-related assets are accessed only by authorized parties. Confidentiality is sometimes called secrecy or privacy. •Integrity: it means that assets can be modified only by authorized parties or only in authorized ways. •Availability: it means that assets are accessible
  • 6. THREE GOALS IN COMPUTING SECURITY •One of the challenges in building a secure system is finding the right balance among the goals, which often conflict.
  • 7. VULNERABILITY •Vulnerability is a weakness in the security system. •Weaknesses can appear in any element of a computer, both in the hardware, operating system, and the software. The types of vulnerabilities we might find as they apply to the assets of hardware, software, and data. •These three assets and the connections among
  • 8. HARDWARE VULNERABILITY •Hardware is more visible than software, largely because it is composed of physical objects. •it is rather simple to attack by adding devices, changing them, removing them, intercepting the traffic to them, or flooding them with traffic until they can no longer function.
  • 9. HARDWARE VULNERABILITY •other ways that computer hardware can be attacked physically. •Computers have been drenched with water, burned, frozen, gassed, and electrocuted with power surges.
  • 10. SOFTWARE VULNERABILITIES •Software can be replaced, changed, or destroyed maliciously, or it can be modified, deleted, or misplaced accidentally. Whether intentional or not, these attacks exploit the software’s vulnerabilities.
  • 11. SOFTWARE VULNERABILITIES •Sometimes, the attacks are obvious, as when the software no longer runs. More subtle are attacks in which the software has been altered but seems to run normally.
  • 12. DATA VULNERABILITY •a data attack is a more widespread and serious problem than either a hardware or software attack. •data items have greater public value than hardware and software because more people know how to use or interpret data.
  • 13. THREATS •A threat to a computing system is a set of circumstances that has the potential to cause loss or harm. •There are many threats to a computer system, including human-initiated and computer- initiated ones. •A threat is blocked by control of a vulnerability. •We can view any threat as being one of four
  • 14. THREATS •An interception means that some unauthorized party has gained access to an asset. The outside party can be a person, a program, or a computing system.
  • 15. THREATS •In an interruption is an asset of the system becomes lost, unavailable, or unusable.
  • 16. THREATS •If an unauthorized party not only accesses but tampers with an asset, is called as a modification.
  • 17. THREATS •An unauthorized party might create a fabrication of counterfeit objects on a computing system. •The intruder may insert spurious transactions to a network communication system or add records to an existing database.
  • 18. ATTACKS •A human who exploits a vulnerability perpetrates an attack on the system. An attack can also be launched by another system, as when one •system sends an overwhelming set of messages to another, virtually shutting down the second system's ability to function.
  • 19. ATTACKS •Unfortunately, we have seen this type of attack frequently, as denial-of-service attacks flood servers with more messages than they can handle.
  • 20. CONTROL •The control is an action, device, procedure or technique that removes or reduces a vulnerability. •We use a control as a protective measure. •There are so many ways to controle.
  • 21. HOW TO SECURE THE COMPUTER •There are two ways 1.Physical secure 2.Other secure methods
  • 22. PHYSICALLY SECURE COMPUTERS •Obtain physical computer locks for all your computers
  • 23. PHYSICALLY SECURE COMPUTERS •Attach mobile proximity alarms to your computers.
  • 24. PHYSICALLY SECURE COMPUTERS •Store computers in an area with secure access. •Or place the computers in a locked room
  • 25. PHYSICALLY SECURE COMPUTERS IN YOUR COLLEGE •Station security guards at entry points to the college building.
  • 26. PHYSICALLY SECURE COMPUTERS IN YOUR COLLEGE •Verify windows and doors are properly locked after office hours.
  • 27. SECURE THE COMPUTER •Choose a good secured operating system
  • 28. SECURE THE COMPUTER •Choose a web browser based on its security and vulnerabilities because most malware will come through via your web browser
  • 29. SECURE THE COMPUTER •When setting up, use strong passwords in your user account, router account etc. Hackers may use dictionary attacks and brute force attacks.
  • 30. SECURE THE COMPUTER •When downloading software (including antivirus software), get it from a trusted source
  • 31. SECURE THE COMPUTER •Install good antivirus software because Antivirus software is designed to deal with modern malware including viruses, Trojans, key loggers, rootkits, and worms.
  • 32. SECURE THE COMPUTER •Download and install a firewall
  • 33. SECURE THE COMPUTER •Close all ports. Hackers use port scanning (Ubuntu Linux has all ports closed by default)
  • 34. SOURCES AND CITATIONS • Security in Computing, Fourth EditionBy Charles P. Pfleeger • http://lifehacker.com/5848296/how-do-i-keep-my-computer-secure-at-the-office • http://it.ojp.gov/documents/asp/disciplines/section1-2.htm • http://www.pcpro.co.uk/blogs/2011/01/21/how-to-physically-secure-your-business- hardware/ • http://www.us-cert.gov/nav/nt01/ • http://blog.chromium.org/2008/10/new-approach-to-browser-security-google.html • http://www.avast.com • http://www.trendsecure.com • http://www.lavasoft.com • http://www.zonealarm.com • http://www.personalfirewall.comodo.com/ • http://www.remote-exploit.org/backtrack.html • http://www.grc.com/securitynow.htm • http://www.hackerhighschool.org/ • http://www.symantec.com/norton/products/library/article.jsp?aid=internet_iq
  • 35. THANK YOU HAVE A SECURED WORLD 

Editor's Notes

  • #23: keep laptop and desktop computers properly secured to desks.
  • #24: Proximity alarms will alert you when equipment is removed outside of a specific radius.
  • #25: This may prevent unauthorized persons or visitors from stealing computers and other equipment.
  • #26: Enforce a rule that requires all visitors to remain in the lobby or to sign a visitor log that requires them to provide identification.
  • #27: This can help prevent theft or burglary from occurring.