SlideShare a Scribd company logo
Computer security
Introduction of CCoommppuutteerr SSeeccuurriittyy.......... 
 What is Computer Security? 
• Lock the doors and windows and you are secure 
NOT 
• Call the police when you feel insecure 
Really? 
• Computers are powerful, programmable machines 
Whoever programs them controls them (and 
not you) 
• Networks are ubiquitous 
Carries genuine as well as malicious traffic 
End result: Complete computer security is 
unattainable, it is a cat and mouse game; 
Similar to crime vs. law enforcement.
Definition WWhhiicchh II DDeeffiinneedd AAbboouutt 
CCoommppuutteerr SSeeccuurriittyy…… 
 Computer Security is the protection of 
computing systems and the data that User store 
or access. 
TThhee DDeeffiinniittiioonn FFrroomm WWiikkiippeeddiiaa 
Computer security is information security as 
applied to computing devices such as 
computers and smart phones, as well as 
computer networks such as private and public 
networks, including the Internet.
GGooaallss OOff CCoommppuutteerr sseeccuurriittyy…….. 
• Integrity: 
Guarantee that the data is what we expect. 
•Confidentiality: 
The information must just be accessible to the 
authorized people. 
•Reliability: 
Computers should work without having unexpected 
problems. 
•Authentication: 
Guarantee that only authorized persons can access 
to the resources.
BBaassiicc SSeeccuurriittyy……
WWhhyy iiss CCoommppuutteerr SSeeccuurriittyy 
IImmppoorrttaanntt??
aallssoo……..
SSeeccuurriittyy AAttttaacckkss 
AAttttaacckk oonn tthhee ccoommppuutteerr ssyysstteemm iittsseellff 
assword guessing 
hishing 
poofing 
ack door 
uffer overflow 
HHaavvee yyoouu eevveerr eexxppeerriieenncceedd oonnee ooff tthheessee??
PPaasssswwoorrdd GGuueessssiinngg 
 Obvious 
PPhhiisshhiinngg 
 Trick users into revealing security information 
SSppooooffiinngg 
 Malicious user masquerades as authorized user 
BBaacckk ddoooorr 
 A backdoor is a program placed by a black-hacker 
that allows him to access a system. A 
backdoor have many functionalities such as 
keyboard-sniffer, display spying, etc.
BBuuffffeerr oovveerrffllooww 
 Defect that could cause a system to crash and 
leave the user with heightened privileges 
DDeenniiaall ooff sseerrvviiccee 
 Attach that prevents authorized user from 
accessing the system 
MMaann iinn tthhee mmiiddddllee 
 Network communication is intercepted in an 
attempt to obtain key data
MMoorree AAttttaacckkss…… 
1. Packet Sniffing (Internet traffic consists of data “packets”, and 
these can be “sniffed”) 
2. Man in the Middle(Insert a router in the path between client and 
server, and change the packets as they pass through) 
3. DNS hijacking(Insert malicious routes into DNS tables to send 
traffic for genuine sites to malicious sites) 
4. Phishing(An evil website pretends to be a trusted website) 
Example: 
1. You type, by mistake, “mibank.com” instead of “mybank.com” 
mibank.com designs the site to look like mybank.com so the user types 
in their info as usual 
2. BAD! Now an evil person has your info!
VViirruuss 
Piece of code that automatically reproduces itself. 
It’s attached to other programs or files, but 
requires user intervention to propagate. 
Attacks on Computer For Virus 
i. Infect Executable files 
ii. Infect Boot sectors 
iii. Infect Documents (macros), scripts (web pages), etc. 
Source of Virus 
It can be create itself in computer system. It also 
create with storage elements, mails, downloaded 
files or shared folders.
WWoorrmm 
Piece of code that automatically reproduces itself over the 
network. It doesn’t need the user intervention to 
propagate (autonomous). 
Attacks on Computer For Worm 
It infects computer via buffer overflow, file sharing, 
configuration errors and other vulnerabilities. 
What It search? 
It search Email addresses, DNS, IP, network 
neighborhood for hacking or Malicious 
programs Backdoor, DDoS agent, etc.
SSoocciiaall EEnnggiinneeeerriinngg 
•Manipulating a person or persons into 
divulging confidential information. 
 Would us also have to aware about this? 
1. Yes, cause Social engineers are a lot more cunning 
than you. 
2. It also can Happen with Corporate Executive & 
Most of theme are fooled by this hackers.
HHeerree’’ss aa ssmmaallll EExxaammppllee ooff SSoocciiaall 
eennggiinneeeerr’’ss wwoorrkk....
HHooww ccaann wwee pprrootteecctt oouurr 
CCoommppuutteerrss & UUss ffrroomm tthhiiss 
kkiinndd ooff tthhrreeaattss.... 
For computer access 
1. User knowledge (Name, password, PIN) 
2. Smart card (A card with an embedded memory chip 
used for identification) 
3. Biometrics (Human characteristics such as fingerprints, 
retina or voice patterns)
GGuuiiddeelliinnee FFoorr PPaasssswwoorrdd........ 
1. Easy to remember, hard to guess 
2. Don’t use family or pet names 
3. Don’t make it accessible 
4. Use combination uppercase/lowercase letters, 
digits and special characters 
5. Don’t leave computer when logged in 
6. Don’t ever tell anyone 
7. Don’t include in an email 
8. Don’t use the same password in lots of places
OOnn IInntteerrnneett 
CAPTCHA 
Software that verifies that the user is not another 
computer 
You have to look at a weird set of 
characters and key them back in. 
Why does this work?
iinnggeerr pprriinntt aannaallyysseerr
Some Other Techniques of 
Securing Computer.... 
Ensuring computer and network security 
i. Cryptography 
ii. Secure networks 
iii. Antivirus software 
iv. Firewalls 
In addition, users have to practice “safe 
computing” 
1. Not downloading from unsafe websites 
2. Not opening attachments 
3. Not trusting what you see on websites 
4. Avoiding Scams
CCrryyppttooggrraapphhyy 
Secret Codes 
 Encryption 
o Converting data to unreadable codes to prevent anyone form 
accessing this information. 
o Need a “key” to find the original data – keys take a few 
million-trillion years to guess. 
 Public keys 
An ingenious system of proving you know your password without 
disclosing your password. Also used for digital signatures. 
o Used heavily in SSL connections. 
 Hashing 
o Creating fingerprints of documents.
Conclusion 
Its not that easy to protect yourself or your computer 
from threats & attacks. But its not that much harder 
either. So just follow some rules & you are protected 
from this threats & attacks. 
Computer security is for protect the user. So we will 
follow the rules to protect ourselves.
Computer security

More Related Content

What's hot (20)

PPTX
Learn awesome hacking tricks
Sudhanshu Mishra
 
PPTX
Black hat hackers
Santosh Kumar
 
PPT
Ethical hacking
zing12345
 
PPTX
Internet security
rfukunaga
 
PPTX
Introduction to Ethical Hacking (Basics)
Sumit Satam
 
PPT
Hacking
Nirmal Dev
 
PPT
Hacking version 2
mubeenm50
 
PPTX
Security Threats
Yasmeen Shaikh
 
PPT
Basic Introduction to hacking
Sainath Volam
 
PPTX
Hacking Vs Cracking in Computer Networks
Srikanth VNV
 
PPSX
Ethical Hacking
Adnan Mansha
 
PPTX
Hacking
vkradhika
 
PPTX
Website attack n defacement n its control measures
أحلام انصارى
 
PDF
Hackingppt 160730081605
RAKESH SHARMA
 
PPTX
National information security education & awareness program
Neel Kamal
 
PPT
Hacking Kishor
kishor sharma
 
PPSX
Web security
kareem zock
 
PPTX
Computer hacking
Arjun Tomar
 
PDF
Internet security tutorial
iuvmtech
 
PPTX
Ethical hacking
arohan6
 
Learn awesome hacking tricks
Sudhanshu Mishra
 
Black hat hackers
Santosh Kumar
 
Ethical hacking
zing12345
 
Internet security
rfukunaga
 
Introduction to Ethical Hacking (Basics)
Sumit Satam
 
Hacking
Nirmal Dev
 
Hacking version 2
mubeenm50
 
Security Threats
Yasmeen Shaikh
 
Basic Introduction to hacking
Sainath Volam
 
Hacking Vs Cracking in Computer Networks
Srikanth VNV
 
Ethical Hacking
Adnan Mansha
 
Hacking
vkradhika
 
Website attack n defacement n its control measures
أحلام انصارى
 
Hackingppt 160730081605
RAKESH SHARMA
 
National information security education & awareness program
Neel Kamal
 
Hacking Kishor
kishor sharma
 
Web security
kareem zock
 
Computer hacking
Arjun Tomar
 
Internet security tutorial
iuvmtech
 
Ethical hacking
arohan6
 

Viewers also liked (20)

PPTX
Application software
Kawsar Ahmed
 
PPTX
Kimmy kangaroo
kinderstars
 
PDF
e-bulletin-November2010
Vivek kaser
 
PDF
The Health Benefits of Indian Food
oddjoker3810
 
PPSX
Shapes shapes-everywhere
kinderstars
 
PPTX
Lou lou moose
kinderstars
 
DOCX
Cognitive dissonance is a Good thing
Aditya Gupta
 
PDF
Angely flores
Flores Angely
 
PDF
為你而讀_國家記憶
Po-ru Lee
 
PPTX
Hippy hippo
kinderstars
 
PPTX
Jenny jaguar
kinderstars
 
PPT
Team building
saiagarwal
 
DOCX
Bet365 review
mafsmafs
 
PPTX
Victor vampire
kinderstars
 
PPTX
Crazy camel
kinderstars
 
DOCX
Holland vs Argentina Predictions
mafsmafs
 
PPTX
Daisy dragon
kinderstars
 
PPTX
法雅客攝影馬拉松記錄
Po-ru Lee
 
PPTX
Farley fox
kinderstars
 
PDF
China air pollution season kicks off with a cough and a wheeze as coal plants...
oddjoker3810
 
Application software
Kawsar Ahmed
 
Kimmy kangaroo
kinderstars
 
e-bulletin-November2010
Vivek kaser
 
The Health Benefits of Indian Food
oddjoker3810
 
Shapes shapes-everywhere
kinderstars
 
Lou lou moose
kinderstars
 
Cognitive dissonance is a Good thing
Aditya Gupta
 
Angely flores
Flores Angely
 
為你而讀_國家記憶
Po-ru Lee
 
Hippy hippo
kinderstars
 
Jenny jaguar
kinderstars
 
Team building
saiagarwal
 
Bet365 review
mafsmafs
 
Victor vampire
kinderstars
 
Crazy camel
kinderstars
 
Holland vs Argentina Predictions
mafsmafs
 
Daisy dragon
kinderstars
 
法雅客攝影馬拉松記錄
Po-ru Lee
 
Farley fox
kinderstars
 
China air pollution season kicks off with a cough and a wheeze as coal plants...
oddjoker3810
 
Ad

Similar to Computer security (20)

DOCX
Chapter 10.0
Adebisi Tolulope
 
PDF
The Basics of Protecting Against Computer Hacking
- Mark - Fullbright
 
PPT
Introduction To Information Security
belsis
 
PDF
Ethical Hacking
Syed Irshad Ali
 
PPT
basic knowhow hacking
Anant Shrivastava
 
PPT
Ethical Hacking
aashish2cool4u
 
PPTX
Computer-Security.pptx
JoselitoJMebolos
 
PPT
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
PPT
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
PPT
Introduction To Computer Security
Vibrant Event
 
PDF
Computer security
RoshanMaharjan13
 
PPT
Dos and Dont to be followed to protect information and technology
ssuser3baba2
 
PPT
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
DOCX
Hamza
HamzaBaqee
 
DOCX
Cyber crime
Salma Zafar
 
PPT
NewIinternet security
university of mumbai
 
PPT
New internet security
university of mumbai
 
PPT
System-Security-acit-Institute
ACIT Education Pvt Ltd
 
PPTX
Computer ethics
RitikaSharma238
 
PPT
Hacking 1224807880385377-9
Geoff Pesimo
 
Chapter 10.0
Adebisi Tolulope
 
The Basics of Protecting Against Computer Hacking
- Mark - Fullbright
 
Introduction To Information Security
belsis
 
Ethical Hacking
Syed Irshad Ali
 
basic knowhow hacking
Anant Shrivastava
 
Ethical Hacking
aashish2cool4u
 
Computer-Security.pptx
JoselitoJMebolos
 
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
Introduction To Computer Security
Vibrant Event
 
Computer security
RoshanMaharjan13
 
Dos and Dont to be followed to protect information and technology
ssuser3baba2
 
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Hamza
HamzaBaqee
 
Cyber crime
Salma Zafar
 
NewIinternet security
university of mumbai
 
New internet security
university of mumbai
 
System-Security-acit-Institute
ACIT Education Pvt Ltd
 
Computer ethics
RitikaSharma238
 
Hacking 1224807880385377-9
Geoff Pesimo
 
Ad

More from Kawsar Ahmed (6)

PPTX
Computer virus
Kawsar Ahmed
 
PPTX
System software is creating a modern world
Kawsar Ahmed
 
PPT
Algorithm Design Presentation
Kawsar Ahmed
 
PPTX
Flow chart
Kawsar Ahmed
 
PPTX
mmmmmmm
Kawsar Ahmed
 
PPTX
Computer Networking
Kawsar Ahmed
 
Computer virus
Kawsar Ahmed
 
System software is creating a modern world
Kawsar Ahmed
 
Algorithm Design Presentation
Kawsar Ahmed
 
Flow chart
Kawsar Ahmed
 
mmmmmmm
Kawsar Ahmed
 
Computer Networking
Kawsar Ahmed
 

Computer security

  • 2. Introduction of CCoommppuutteerr SSeeccuurriittyy..........  What is Computer Security? • Lock the doors and windows and you are secure NOT • Call the police when you feel insecure Really? • Computers are powerful, programmable machines Whoever programs them controls them (and not you) • Networks are ubiquitous Carries genuine as well as malicious traffic End result: Complete computer security is unattainable, it is a cat and mouse game; Similar to crime vs. law enforcement.
  • 3. Definition WWhhiicchh II DDeeffiinneedd AAbboouutt CCoommppuutteerr SSeeccuurriittyy……  Computer Security is the protection of computing systems and the data that User store or access. TThhee DDeeffiinniittiioonn FFrroomm WWiikkiippeeddiiaa Computer security is information security as applied to computing devices such as computers and smart phones, as well as computer networks such as private and public networks, including the Internet.
  • 4. GGooaallss OOff CCoommppuutteerr sseeccuurriittyy…….. • Integrity: Guarantee that the data is what we expect. •Confidentiality: The information must just be accessible to the authorized people. •Reliability: Computers should work without having unexpected problems. •Authentication: Guarantee that only authorized persons can access to the resources.
  • 6. WWhhyy iiss CCoommppuutteerr SSeeccuurriittyy IImmppoorrttaanntt??
  • 8. SSeeccuurriittyy AAttttaacckkss AAttttaacckk oonn tthhee ccoommppuutteerr ssyysstteemm iittsseellff assword guessing hishing poofing ack door uffer overflow HHaavvee yyoouu eevveerr eexxppeerriieenncceedd oonnee ooff tthheessee??
  • 9. PPaasssswwoorrdd GGuueessssiinngg  Obvious PPhhiisshhiinngg  Trick users into revealing security information SSppooooffiinngg  Malicious user masquerades as authorized user BBaacckk ddoooorr  A backdoor is a program placed by a black-hacker that allows him to access a system. A backdoor have many functionalities such as keyboard-sniffer, display spying, etc.
  • 10. BBuuffffeerr oovveerrffllooww  Defect that could cause a system to crash and leave the user with heightened privileges DDeenniiaall ooff sseerrvviiccee  Attach that prevents authorized user from accessing the system MMaann iinn tthhee mmiiddddllee  Network communication is intercepted in an attempt to obtain key data
  • 11. MMoorree AAttttaacckkss…… 1. Packet Sniffing (Internet traffic consists of data “packets”, and these can be “sniffed”) 2. Man in the Middle(Insert a router in the path between client and server, and change the packets as they pass through) 3. DNS hijacking(Insert malicious routes into DNS tables to send traffic for genuine sites to malicious sites) 4. Phishing(An evil website pretends to be a trusted website) Example: 1. You type, by mistake, “mibank.com” instead of “mybank.com” mibank.com designs the site to look like mybank.com so the user types in their info as usual 2. BAD! Now an evil person has your info!
  • 12. VViirruuss Piece of code that automatically reproduces itself. It’s attached to other programs or files, but requires user intervention to propagate. Attacks on Computer For Virus i. Infect Executable files ii. Infect Boot sectors iii. Infect Documents (macros), scripts (web pages), etc. Source of Virus It can be create itself in computer system. It also create with storage elements, mails, downloaded files or shared folders.
  • 13. WWoorrmm Piece of code that automatically reproduces itself over the network. It doesn’t need the user intervention to propagate (autonomous). Attacks on Computer For Worm It infects computer via buffer overflow, file sharing, configuration errors and other vulnerabilities. What It search? It search Email addresses, DNS, IP, network neighborhood for hacking or Malicious programs Backdoor, DDoS agent, etc.
  • 14. SSoocciiaall EEnnggiinneeeerriinngg •Manipulating a person or persons into divulging confidential information.  Would us also have to aware about this? 1. Yes, cause Social engineers are a lot more cunning than you. 2. It also can Happen with Corporate Executive & Most of theme are fooled by this hackers.
  • 15. HHeerree’’ss aa ssmmaallll EExxaammppllee ooff SSoocciiaall eennggiinneeeerr’’ss wwoorrkk....
  • 16. HHooww ccaann wwee pprrootteecctt oouurr CCoommppuutteerrss & UUss ffrroomm tthhiiss kkiinndd ooff tthhrreeaattss.... For computer access 1. User knowledge (Name, password, PIN) 2. Smart card (A card with an embedded memory chip used for identification) 3. Biometrics (Human characteristics such as fingerprints, retina or voice patterns)
  • 17. GGuuiiddeelliinnee FFoorr PPaasssswwoorrdd........ 1. Easy to remember, hard to guess 2. Don’t use family or pet names 3. Don’t make it accessible 4. Use combination uppercase/lowercase letters, digits and special characters 5. Don’t leave computer when logged in 6. Don’t ever tell anyone 7. Don’t include in an email 8. Don’t use the same password in lots of places
  • 18. OOnn IInntteerrnneett CAPTCHA Software that verifies that the user is not another computer You have to look at a weird set of characters and key them back in. Why does this work?
  • 20. Some Other Techniques of Securing Computer.... Ensuring computer and network security i. Cryptography ii. Secure networks iii. Antivirus software iv. Firewalls In addition, users have to practice “safe computing” 1. Not downloading from unsafe websites 2. Not opening attachments 3. Not trusting what you see on websites 4. Avoiding Scams
  • 21. CCrryyppttooggrraapphhyy Secret Codes  Encryption o Converting data to unreadable codes to prevent anyone form accessing this information. o Need a “key” to find the original data – keys take a few million-trillion years to guess.  Public keys An ingenious system of proving you know your password without disclosing your password. Also used for digital signatures. o Used heavily in SSL connections.  Hashing o Creating fingerprints of documents.
  • 22. Conclusion Its not that easy to protect yourself or your computer from threats & attacks. But its not that much harder either. So just follow some rules & you are protected from this threats & attacks. Computer security is for protect the user. So we will follow the rules to protect ourselves.