Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
INTRODUCTION OF COMPUTER
SECURITY
COMPUTER SECRITY
o Computer and network security was not at all well
known,even about 12 years ago
o Today ,it is something everyone is aware of the need ,but nit
sure what is really means
o Interesting topic of threads ,counter measures
risks,stories,events and paranoia
MEDIA STORIES
o Consumers are bombarded with media reports narrating
dangers of the online world
o IDENTITY THEFT
o EMBEZZIEMENT AND FRAUD
o CREDIT CARD THEFT
o CORPORATE LOSS
GOALS OF COMPUTER SECURITY
o INTEGRITY
o Guarantee that the data is what we except
o CONFIDENTIALITY
o The information must just be accessible to the
authorized people
o RELIABILITY
o Computer should work without having unexpected
problems
o AUTHENTICATION
o Guarantee that only authorized persons can access to
the resource
SECURITY BASICS
WHAT DOES IT MEANS TO BE SECURE ????
o “Include protection of information from theft or corruption
or the preservation of availability as defined in the security
policy.”
o TYPES OF SECURITY
o Network security
o System and software security
o Physical security
o Software cannot protect software (may be hardware can )
o Networks can be protected better than software
SOME OF TYPES ATTACK
SOME COMMON ATTACKS
Network attacks
o Packet sniffing man –in –the middle, DNS hacking
Web attacks
o Phishing , SQL injection ,cross site scripting
OS , Application and software attacks
o Virus , trojans , worms , rootkits , buffer overflow
Social Engineering
o (NOT social networking)
NETWORK ATTACKS
o PACKET SNIFFING
o Internet traffic consists of the data “PACKETS” an
these can be “SNIFFED”
o Leads to other attacks such as password sniffing
,cookie stealing session hijacking information
technology
o MAN IN THE MIDDLE
o Insert a router in the path between client and server
and change the packet as they pass through
o DNS HIJACKING
o Insert malicious routers in DNS tablets TO send
traffic for genuine sites to malicious sites
WEB ATTACKS
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security

More Related Content

What's hot

Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
toamma
 
Network security
Network securityNetwork security
Network security
Nkosinathi Lungu
 
Network security
Network securityNetwork security
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
hazirma
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
Ana Meskovska
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
AfiqEfendy Zaen
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Network Security
Network SecurityNetwork Security
Network Security
Joe Baker
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
Srinu Potnuru
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
hassanmughal4u
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
Vikram Khanna
 
Hardware Security
Hardware SecurityHardware Security
Hardware Security
Mani Rathnam
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
joy grace bagui
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
AditiPatni3
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
hamzakareem2
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
Pankaj Jha
 

What's hot (20)

Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Network security
Network securityNetwork security
Network security
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Hardware Security
Hardware SecurityHardware Security
Hardware Security
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 

Similar to Introduction of computer security

E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
S.M. Towhidul Islam
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
Jetking
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
ACIT Education Pvt Ltd
 
Network security
Network securityNetwork security
Network security
toamma
 
Internet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security ConcernsInternet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security Concerns
Akshay Jain
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
online Marketing
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
Iaetsd Iaetsd
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
Taniya Fansupkar
 
Network Security
Network SecurityNetwork Security
Network Security
Puneet Abichandani
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
cyber security services | MasGlobal Services
cyber security services | MasGlobal Servicescyber security services | MasGlobal Services
cyber security services | MasGlobal Services
Mas Global Services
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
Gryffin EJ
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
hdbundo
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
ssuser84f16f
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
zaarahary
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
JamesDempsey1
 
Basic of Information Security
Basic of Information SecurityBasic of Information Security
Basic of Information Security
Potato
 

Similar to Introduction of computer security (20)

E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Network security
Network securityNetwork security
Network security
 
Internet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security ConcernsInternet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security Concerns
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
cyber security services | MasGlobal Services
cyber security services | MasGlobal Servicescyber security services | MasGlobal Services
cyber security services | MasGlobal Services
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Basic of Information Security
Basic of Information SecurityBasic of Information Security
Basic of Information Security
 

Recently uploaded

一比一原版(monash毕业证)莫纳什大学毕业证如何办理
一比一原版(monash毕业证)莫纳什大学毕业证如何办理一比一原版(monash毕业证)莫纳什大学毕业证如何办理
一比一原版(monash毕业证)莫纳什大学毕业证如何办理
wtuxap
 
@Call @Girls in Patna 🤷‍♂️ XXXXXXXX 🤷‍♂️ Tanisha Sharma Best High Class Pat...
 @Call @Girls in Patna 🤷‍♂️  XXXXXXXX 🤷‍♂️ Tanisha Sharma Best High Class Pat... @Call @Girls in Patna 🤷‍♂️  XXXXXXXX 🤷‍♂️ Tanisha Sharma Best High Class Pat...
@Call @Girls in Patna 🤷‍♂️ XXXXXXXX 🤷‍♂️ Tanisha Sharma Best High Class Pat...
tamilitambolika
 
@Call @Girls in Lucknow 🐱‍🐉 XX8630512678 🐱‍🐉 Genuine WhatsApp Number for R...
 @Call @Girls in Lucknow 🐱‍🐉 XX8630512678 🐱‍🐉   Genuine WhatsApp Number for R... @Call @Girls in Lucknow 🐱‍🐉 XX8630512678 🐱‍🐉   Genuine WhatsApp Number for R...
@Call @Girls in Lucknow 🐱‍🐉 XX8630512678 🐱‍🐉 Genuine WhatsApp Number for R...
HyderabadDolls
 
Juhu @Call @Girls Whatsapp 9930687706 With High Profile Service
Juhu @Call @Girls Whatsapp 9930687706 With High Profile ServiceJuhu @Call @Girls Whatsapp 9930687706 With High Profile Service
Juhu @Call @Girls Whatsapp 9930687706 With High Profile Service
kolkata dolls
 
What is the Meaning of the Word Biscuit?
What is the Meaning of the Word Biscuit?What is the Meaning of the Word Biscuit?
What is the Meaning of the Word Biscuit?
Mona Rathore
 
Choosing the Best Platform and Development Strategy for Your App
Choosing the Best Platform and Development Strategy for Your AppChoosing the Best Platform and Development Strategy for Your App
Choosing the Best Platform and Development Strategy for Your App
ISH Technologies
 
一比一原版加拿大圭尔夫大学毕业证(uofg毕业证书)如何办理
一比一原版加拿大圭尔夫大学毕业证(uofg毕业证书)如何办理一比一原版加拿大圭尔夫大学毕业证(uofg毕业证书)如何办理
一比一原版加拿大圭尔夫大学毕业证(uofg毕业证书)如何办理
wtuxap
 
一比一原版(mun毕业证)纽芬兰纪念大学毕业证如何办理
一比一原版(mun毕业证)纽芬兰纪念大学毕业证如何办理一比一原版(mun毕业证)纽芬兰纪念大学毕业证如何办理
一比一原版(mun毕业证)纽芬兰纪念大学毕业证如何办理
wtuxap
 
一比一原版(essex毕业证)埃塞克斯大学毕业证如何办理
一比一原版(essex毕业证)埃塞克斯大学毕业证如何办理一比一原版(essex毕业证)埃塞克斯大学毕业证如何办理
一比一原版(essex毕业证)埃塞克斯大学毕业证如何办理
wtuxap
 
Biography And Tributes of the Late Mrs Stella Atsupui Eddah Amedorme.pdf
Biography And Tributes of the Late Mrs Stella Atsupui Eddah Amedorme.pdfBiography And Tributes of the Late Mrs Stella Atsupui Eddah Amedorme.pdf
Biography And Tributes of the Late Mrs Stella Atsupui Eddah Amedorme.pdf
amgratefulkhid
 
一比一原版(uw毕业证)华盛顿大学毕业证如何办理
一比一原版(uw毕业证)华盛顿大学毕业证如何办理一比一原版(uw毕业证)华盛顿大学毕业证如何办理
一比一原版(uw毕业证)华盛顿大学毕业证如何办理
wtuxap
 
Mumbai Central @Call @Girls Whatsapp 9930687706 With High Profile Service
Mumbai Central @Call @Girls Whatsapp 9930687706 With High Profile ServiceMumbai Central @Call @Girls Whatsapp 9930687706 With High Profile Service
Mumbai Central @Call @Girls Whatsapp 9930687706 With High Profile Service
kolkata dolls
 
Mobile Interconnection Rates New Methodology with Real
Mobile Interconnection Rates New Methodology with RealMobile Interconnection Rates New Methodology with Real
Mobile Interconnection Rates New Methodology with Real
NebojsaKuduz1
 

Recently uploaded (13)

一比一原版(monash毕业证)莫纳什大学毕业证如何办理
一比一原版(monash毕业证)莫纳什大学毕业证如何办理一比一原版(monash毕业证)莫纳什大学毕业证如何办理
一比一原版(monash毕业证)莫纳什大学毕业证如何办理
 
@Call @Girls in Patna 🤷‍♂️ XXXXXXXX 🤷‍♂️ Tanisha Sharma Best High Class Pat...
 @Call @Girls in Patna 🤷‍♂️  XXXXXXXX 🤷‍♂️ Tanisha Sharma Best High Class Pat... @Call @Girls in Patna 🤷‍♂️  XXXXXXXX 🤷‍♂️ Tanisha Sharma Best High Class Pat...
@Call @Girls in Patna 🤷‍♂️ XXXXXXXX 🤷‍♂️ Tanisha Sharma Best High Class Pat...
 
@Call @Girls in Lucknow 🐱‍🐉 XX8630512678 🐱‍🐉 Genuine WhatsApp Number for R...
 @Call @Girls in Lucknow 🐱‍🐉 XX8630512678 🐱‍🐉   Genuine WhatsApp Number for R... @Call @Girls in Lucknow 🐱‍🐉 XX8630512678 🐱‍🐉   Genuine WhatsApp Number for R...
@Call @Girls in Lucknow 🐱‍🐉 XX8630512678 🐱‍🐉 Genuine WhatsApp Number for R...
 
Juhu @Call @Girls Whatsapp 9930687706 With High Profile Service
Juhu @Call @Girls Whatsapp 9930687706 With High Profile ServiceJuhu @Call @Girls Whatsapp 9930687706 With High Profile Service
Juhu @Call @Girls Whatsapp 9930687706 With High Profile Service
 
What is the Meaning of the Word Biscuit?
What is the Meaning of the Word Biscuit?What is the Meaning of the Word Biscuit?
What is the Meaning of the Word Biscuit?
 
Choosing the Best Platform and Development Strategy for Your App
Choosing the Best Platform and Development Strategy for Your AppChoosing the Best Platform and Development Strategy for Your App
Choosing the Best Platform and Development Strategy for Your App
 
一比一原版加拿大圭尔夫大学毕业证(uofg毕业证书)如何办理
一比一原版加拿大圭尔夫大学毕业证(uofg毕业证书)如何办理一比一原版加拿大圭尔夫大学毕业证(uofg毕业证书)如何办理
一比一原版加拿大圭尔夫大学毕业证(uofg毕业证书)如何办理
 
一比一原版(mun毕业证)纽芬兰纪念大学毕业证如何办理
一比一原版(mun毕业证)纽芬兰纪念大学毕业证如何办理一比一原版(mun毕业证)纽芬兰纪念大学毕业证如何办理
一比一原版(mun毕业证)纽芬兰纪念大学毕业证如何办理
 
一比一原版(essex毕业证)埃塞克斯大学毕业证如何办理
一比一原版(essex毕业证)埃塞克斯大学毕业证如何办理一比一原版(essex毕业证)埃塞克斯大学毕业证如何办理
一比一原版(essex毕业证)埃塞克斯大学毕业证如何办理
 
Biography And Tributes of the Late Mrs Stella Atsupui Eddah Amedorme.pdf
Biography And Tributes of the Late Mrs Stella Atsupui Eddah Amedorme.pdfBiography And Tributes of the Late Mrs Stella Atsupui Eddah Amedorme.pdf
Biography And Tributes of the Late Mrs Stella Atsupui Eddah Amedorme.pdf
 
一比一原版(uw毕业证)华盛顿大学毕业证如何办理
一比一原版(uw毕业证)华盛顿大学毕业证如何办理一比一原版(uw毕业证)华盛顿大学毕业证如何办理
一比一原版(uw毕业证)华盛顿大学毕业证如何办理
 
Mumbai Central @Call @Girls Whatsapp 9930687706 With High Profile Service
Mumbai Central @Call @Girls Whatsapp 9930687706 With High Profile ServiceMumbai Central @Call @Girls Whatsapp 9930687706 With High Profile Service
Mumbai Central @Call @Girls Whatsapp 9930687706 With High Profile Service
 
Mobile Interconnection Rates New Methodology with Real
Mobile Interconnection Rates New Methodology with RealMobile Interconnection Rates New Methodology with Real
Mobile Interconnection Rates New Methodology with Real
 

Introduction of computer security

  • 2. COMPUTER SECRITY o Computer and network security was not at all well known,even about 12 years ago o Today ,it is something everyone is aware of the need ,but nit sure what is really means o Interesting topic of threads ,counter measures risks,stories,events and paranoia
  • 3. MEDIA STORIES o Consumers are bombarded with media reports narrating dangers of the online world o IDENTITY THEFT o EMBEZZIEMENT AND FRAUD o CREDIT CARD THEFT o CORPORATE LOSS
  • 4. GOALS OF COMPUTER SECURITY o INTEGRITY o Guarantee that the data is what we except o CONFIDENTIALITY o The information must just be accessible to the authorized people o RELIABILITY o Computer should work without having unexpected problems o AUTHENTICATION o Guarantee that only authorized persons can access to the resource
  • 5. SECURITY BASICS WHAT DOES IT MEANS TO BE SECURE ???? o “Include protection of information from theft or corruption or the preservation of availability as defined in the security policy.” o TYPES OF SECURITY o Network security o System and software security o Physical security o Software cannot protect software (may be hardware can ) o Networks can be protected better than software
  • 6. SOME OF TYPES ATTACK SOME COMMON ATTACKS Network attacks o Packet sniffing man –in –the middle, DNS hacking Web attacks o Phishing , SQL injection ,cross site scripting OS , Application and software attacks o Virus , trojans , worms , rootkits , buffer overflow Social Engineering o (NOT social networking)
  • 7. NETWORK ATTACKS o PACKET SNIFFING o Internet traffic consists of the data “PACKETS” an these can be “SNIFFED” o Leads to other attacks such as password sniffing ,cookie stealing session hijacking information technology o MAN IN THE MIDDLE o Insert a router in the path between client and server and change the packet as they pass through o DNS HIJACKING o Insert malicious routers in DNS tablets TO send traffic for genuine sites to malicious sites