Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Presentation 
Computer Security and 
Safety, Ethics, and Privacy 
Presented By: 
Adeel Khurram 
1 
Supervised By: 
Engr.Zahra Noor
Computer Security Risks 
• A computer security risk is any event 
Or action that could cause a loss of 
or damage to computer hardware, 
Software , data, information , or processing 
capability. While some breaches 
to computer security are accidental, 
many are intentional.
Computer Security Risks 
• An intentional breach of computer 
Security often involves a deliberate 
act that is against the law. 
• Any illegal act involving a computer 
generally is referred to as a 
Computer Crime/Cyber Crime.
Cyber Crimes
Categories Of Cyber Criminals 
• There are following 7ven Categories of 
These Perpetrators. 
1. Hackers 
2. Crackers 
3. Script Kiddies 
4. Corporate Spies 
5. Unethical Employees 
6. Cyber Extortionist 
7. Cyber Terrorists
Who They Are?
7 
A computer 
enthusiast, 
refers to 
someone who 
accesses a 
computer or 
network 
illegally. 
Crackers 
Accesses a computer 
or network 
illegally but has the 
intent of 
destroying data, 
stealing information, 
or other malicious 
action. 
Hacker
8 
Corporate 
Spies 
Excellent 
Computer skills 
and are hired to 
break into a 
specific computer 
and steal its 
proprietary data 
and information. 
Scripts 
Kiddies 
A script kiddie has the 
same intent as a cracker 
but does not have the 
technical skills and 
knowledge. Script 
kiddies often use 
prewritten hacking and 
cracking programs
9 
break into their 
employers’ 
computers for a 
variety of reasons. 
. Others seek 
financial gains 
from selling 
confidential 
information. 
Who uses e-mail as a 
vehicle for extortion. These 
perpetrators send an 
organization a threatening 
e-mail message indicating 
they will expose 
confidential information, or 
launch an attack if they are 
not paid a sum of money.
10 
Cyber terrorist 
A cyber terrorist is someone 
who uses the Internet or network 
to destroy or damage computers 
for political reasons. The Cyber 
terrorist might target the nation’s 
Air traffic control system, electricity-generating 
companies, or a telecommunications infrastructure.
11 
Cyber warfare 
The term, cyberwarfare, describes 
an attack whose goal ranges from 
disabling a government’s 
computer network to crippling 
a country. Cyber terrorism and 
Cyber warfare usually require a team of highly 
skilled individuals, millions of dollars, and several 
years of planning.
Computer Viruses, 
• A computer virus is a potentially damaging 
computer program that affects, or infects, a 
computer negatively by altering the way 
the computer works without the user’s 
knowledge or permission.
Worms, Trojan Horses, and Rootkits 
• A worm is a program that copies itself 
Repeatedly, cause files damages. 
• A Trojan horse that hides within or looks like a 
legitimate program. A certain condition triggers it. 
• A rootkit is a program that hides in a computer 
and allows someone from a remote location 
to take full control of the computer.
Safeguards against Computer Viruses 
and Other Malware 
• Do not start a computer with removable media inserted in the 
drives or plugged in the ports. 
• Never open an e-mail attachment unless you are expecting the 
attachment and it is from a trusted source. 
• Should set the macro security so that the application 
software warns users that contains viruses in Micros. 
• Should install an antivirus program and update it frequently.
BOT/Bot Net 
• A botnet is a group of 
compromised 
computers connected 
to a network attacks 
other networks, 
usually for wicked 
purposes. A bot is a 
program that performs 
a repetitive task on a 
network. 
DoS attack 
DoS attack, is an assault 
whose purpose is to disrupt 
computer access to an 
Internet service such as the 
Web or e-mail. DDoS 
attacks have been able to 
stop operations temporarily 
at numerous Web sites, 
including powerhouses 
such as Yahoo!, eBay, 
Amazon.com, and CNN.com
• A back door is a program or set of instructions in a program 
that allow users to bypass security controls when accessing a 
program, computer, or network. Root Kit is a Backdoor. 
Spoofing is a technique intruders use to make their network or 
Internet transmission appear legitimate to a victim computer or 
network. Several types of spoofing schemes exist. One type, 
called e-mail spoofing, occurs when the sender’s address or 
other components of the e-mail header are altered so that it 
appears the e-mail originated from a different sender.
Safeguards against Botnets, DoS/DDoS 
Attacks, Back Doors, and Spoofing 
• A firewall is hardware and/or software that protects a 
network’s resources from intrusion by users on another 
network such as the Internet. 
A honeypot is a vulnerable computer that is set up to 
entice an intruder to break into it. These computers, 
which appear real to the intruder, actually are separated 
safely from the organization’s network.
Unauthorized Access 
and Use 
• Unauthorized access is the use of a computer or network 
without permission. Unauthorized use is the use of a 
computer or its data for unapproved or possibly illegal 
activities. 
Safeguards against Unauthorized 
Access and Use 
1. Passwords And User Names 2. CAPTCHA(completely auto mated public turning test to 
tell computers and humans apart) 3. PIN 4. Biometric Devices 5. . Possesed 
objects(cards,Badges)
Hardware Theft And Vandalisms 
• Hardware theft is the act of stealing computer equipment. 
• Hardware vandalism is the act of defacing or destroying 
computer equipment. 
Safeguards against Hardware Theft 
and Vandalism 
Physical access controls, such as locked doors and windows. 
Installing Alarms, cables that lock the equipment to a desk, Small locking 
devices also exist that require a key to access a hard disk or optical disc 
drive. real time location system (RTLS) to track and identify the location of 
high-risk or high-value items. One implementation of RTLS places RFID tags 
in items to be tracked.
Software Theft 
Software theft occurs when someone (1) steals software 
media, (2) intentionally erases programs, (3) illegally copies 
a program, or (4) illegally registers and/or activates a 
program. 
Safeguards against Software Theft 
keep original software boxes and media in a secure location. 
should back up their files and disks regularly, A license 
agreement is the right 
to use the software.
Information Theft 
• Information theft occurs when someone steals personal or 
confidential information. If stolen, the loss of information 
can cause as much damage as (if not more than) hardware 
or software theft. 
Safeguards against Information Theft 
•Apply user identification and authentication controls. use 
variety of encryption techniques.
Encryption 
• Encryption is a process of converting 
readable data into unreadable characters to prevent 
unauthorized access. To read the data, the recipient 
must decrypt, or decipher, it into a readable form. An 
encryption algorithm, or cypher, is a set of steps that 
can convert plaintext into unreadable ciphertext.
System Failure 
• A system an electrical power variation due to Overvoltage , 
undervoltage and Noise. It also can cause loss of data , in 
formation and hardwares. 
Safeguards against System Failure 
• Use surge protector, to smooth out minor noise, 
• Use uninterruptible power supply (UPS), 
• Fault-tolerant computer 
• Use RAID to Full Backup.
Computer Security risks Shelly

More Related Content

What's hot

Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Computer Security
Computer SecurityComputer Security
Computer Security
vishal purkuti
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
CAS
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Computer Security
Computer SecurityComputer Security
Computer Security
AkNirojan
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Md. Atiqur Rahman
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
Pushkar Pashupat
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
Cloudflare
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Krutarth Vasavada
 
Computer security
Computer securityComputer security
Computer security
Ayesha Arshad
 

What's hot (20)

Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Computer security
Computer securityComputer security
Computer security
 

Viewers also liked

Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
Miguel Rebollo
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
amiable_indian
 
Excel Lecture
Excel LectureExcel Lecture
Excel Lecture
deborah canning
 
Hardware theft
Hardware theftHardware theft
Hardware theft
chrispaul8676
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
Mar Soriano
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
chrispaul8676
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
hazirma
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
Fizaril Amzari Omar
 
Software theft
Software theftSoftware theft
Software theft
chrispaul8676
 

Viewers also liked (11)

Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Excel Lecture
Excel LectureExcel Lecture
Excel Lecture
 
Hardware theft
Hardware theftHardware theft
Hardware theft
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Software theft
Software theftSoftware theft
Software theft
 

Similar to Computer Security risks Shelly

Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
AmolKumarPandey2
 
Computer security and
Computer security andComputer security and
Computer security and
Rana Usman Sattar
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
rizwanshafique4321
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
Ardit Meti
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
limsh
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
Haider Ali Malik
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
Sonali Srivastava
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
Ashish prashar
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
 
computer security
computer securitycomputer security
computer security
Azhar Akhtar
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
MuhammadRehan856177
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
MuhammadRehan856177
 
Computer security
Computer securityComputer security
Computer security
Mahesh Singh Madai
 

Similar to Computer Security risks Shelly (20)

Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Computer security and
Computer security andComputer security and
Computer security and
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
cyber security
cyber security cyber security
cyber security
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
computer security
computer securitycomputer security
computer security
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Computer security
Computer securityComputer security
Computer security
 

More from Adeel Khurram

What is active directory
What is active directoryWhat is active directory
What is active directory
Adeel Khurram
 
Usages of May and can
Usages of May and canUsages of May and can
Usages of May and can
Adeel Khurram
 
English Punctuation
English PunctuationEnglish Punctuation
English Punctuation
Adeel Khurram
 
Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Personal firewall,Ad Wares,Spy wares,Viruses,Anti VirusesPersonal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Adeel Khurram
 
Personal firewall,Spy ware,ad ware remover and viruses
Personal firewall,Spy ware,ad ware remover and virusesPersonal firewall,Spy ware,ad ware remover and viruses
Personal firewall,Spy ware,ad ware remover and viruses
Adeel Khurram
 
Computer simulation
Computer simulationComputer simulation
Computer simulation
Adeel Khurram
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standards
Adeel Khurram
 
Coaxial cable and its types
Coaxial cable and its typesCoaxial cable and its types
Coaxial cable and its types
Adeel Khurram
 
Gps2014
Gps2014Gps2014
Gps2014
Adeel Khurram
 

More from Adeel Khurram (9)

What is active directory
What is active directoryWhat is active directory
What is active directory
 
Usages of May and can
Usages of May and canUsages of May and can
Usages of May and can
 
English Punctuation
English PunctuationEnglish Punctuation
English Punctuation
 
Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Personal firewall,Ad Wares,Spy wares,Viruses,Anti VirusesPersonal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
 
Personal firewall,Spy ware,ad ware remover and viruses
Personal firewall,Spy ware,ad ware remover and virusesPersonal firewall,Spy ware,ad ware remover and viruses
Personal firewall,Spy ware,ad ware remover and viruses
 
Computer simulation
Computer simulationComputer simulation
Computer simulation
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standards
 
Coaxial cable and its types
Coaxial cable and its typesCoaxial cable and its types
Coaxial cable and its types
 
Gps2014
Gps2014Gps2014
Gps2014
 

Recently uploaded

Beginner's Guide to Bypassing Falco Container Runtime Security in Kubernetes ...
Beginner's Guide to Bypassing Falco Container Runtime Security in Kubernetes ...Beginner's Guide to Bypassing Falco Container Runtime Security in Kubernetes ...
Beginner's Guide to Bypassing Falco Container Runtime Security in Kubernetes ...
anjaliinfosec
 
Delegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use CasesDelegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use Cases
Celine George
 
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
JackieSparrow3
 
The basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptxThe basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptx
heathfieldcps1
 
How to Install Theme in the Odoo 17 ERP
How to  Install Theme in the Odoo 17 ERPHow to  Install Theme in the Odoo 17 ERP
How to Install Theme in the Odoo 17 ERP
Celine George
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
heathfieldcps1
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...
Nguyen Thanh Tu Collection
 
Capitol Doctoral Presentation -June 2024v2.pptx
Capitol Doctoral Presentation -June 2024v2.pptxCapitol Doctoral Presentation -June 2024v2.pptx
Capitol Doctoral Presentation -June 2024v2.pptx
CapitolTechU
 
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptxFinal_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
shimeathdelrosario1
 
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Murugan Solaiyappan
 
Book Allied Health Sciences kmu MCQs.docx
Book Allied Health Sciences kmu MCQs.docxBook Allied Health Sciences kmu MCQs.docx
Book Allied Health Sciences kmu MCQs.docx
drtech3715
 
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptxChapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Brajeswar Paul
 
How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17
Celine George
 
Front Desk Management in the Odoo 17 ERP
Front Desk  Management in the Odoo 17 ERPFront Desk  Management in the Odoo 17 ERP
Front Desk Management in the Odoo 17 ERP
Celine George
 
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ..."DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
thanhluan21
 
Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024
Elizabeth Walsh
 
L1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 interventionL1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 intervention
RHODAJANEAURESTILA
 
Conducting exciting academic research in Computer Science
Conducting exciting academic research in Computer ScienceConducting exciting academic research in Computer Science
Conducting exciting academic research in Computer Science
Abhik Roychoudhury
 
Beyond the Advance Presentation for By the Book 9
Beyond the Advance Presentation for By the Book 9Beyond the Advance Presentation for By the Book 9
Beyond the Advance Presentation for By the Book 9
John Rodzvilla
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
KlettWorldLanguages
 

Recently uploaded (20)

Beginner's Guide to Bypassing Falco Container Runtime Security in Kubernetes ...
Beginner's Guide to Bypassing Falco Container Runtime Security in Kubernetes ...Beginner's Guide to Bypassing Falco Container Runtime Security in Kubernetes ...
Beginner's Guide to Bypassing Falco Container Runtime Security in Kubernetes ...
 
Delegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use CasesDelegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use Cases
 
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
 
The basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptxThe basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptx
 
How to Install Theme in the Odoo 17 ERP
How to  Install Theme in the Odoo 17 ERPHow to  Install Theme in the Odoo 17 ERP
How to Install Theme in the Odoo 17 ERP
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...
 
Capitol Doctoral Presentation -June 2024v2.pptx
Capitol Doctoral Presentation -June 2024v2.pptxCapitol Doctoral Presentation -June 2024v2.pptx
Capitol Doctoral Presentation -June 2024v2.pptx
 
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptxFinal_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
 
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
 
Book Allied Health Sciences kmu MCQs.docx
Book Allied Health Sciences kmu MCQs.docxBook Allied Health Sciences kmu MCQs.docx
Book Allied Health Sciences kmu MCQs.docx
 
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptxChapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
 
How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17
 
Front Desk Management in the Odoo 17 ERP
Front Desk  Management in the Odoo 17 ERPFront Desk  Management in the Odoo 17 ERP
Front Desk Management in the Odoo 17 ERP
 
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ..."DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
 
Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024
 
L1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 interventionL1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 intervention
 
Conducting exciting academic research in Computer Science
Conducting exciting academic research in Computer ScienceConducting exciting academic research in Computer Science
Conducting exciting academic research in Computer Science
 
Beyond the Advance Presentation for By the Book 9
Beyond the Advance Presentation for By the Book 9Beyond the Advance Presentation for By the Book 9
Beyond the Advance Presentation for By the Book 9
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
 

Computer Security risks Shelly

  • 1. Presentation Computer Security and Safety, Ethics, and Privacy Presented By: Adeel Khurram 1 Supervised By: Engr.Zahra Noor
  • 2. Computer Security Risks • A computer security risk is any event Or action that could cause a loss of or damage to computer hardware, Software , data, information , or processing capability. While some breaches to computer security are accidental, many are intentional.
  • 3. Computer Security Risks • An intentional breach of computer Security often involves a deliberate act that is against the law. • Any illegal act involving a computer generally is referred to as a Computer Crime/Cyber Crime.
  • 5. Categories Of Cyber Criminals • There are following 7ven Categories of These Perpetrators. 1. Hackers 2. Crackers 3. Script Kiddies 4. Corporate Spies 5. Unethical Employees 6. Cyber Extortionist 7. Cyber Terrorists
  • 7. 7 A computer enthusiast, refers to someone who accesses a computer or network illegally. Crackers Accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. Hacker
  • 8. 8 Corporate Spies Excellent Computer skills and are hired to break into a specific computer and steal its proprietary data and information. Scripts Kiddies A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Script kiddies often use prewritten hacking and cracking programs
  • 9. 9 break into their employers’ computers for a variety of reasons. . Others seek financial gains from selling confidential information. Who uses e-mail as a vehicle for extortion. These perpetrators send an organization a threatening e-mail message indicating they will expose confidential information, or launch an attack if they are not paid a sum of money.
  • 10. 10 Cyber terrorist A cyber terrorist is someone who uses the Internet or network to destroy or damage computers for political reasons. The Cyber terrorist might target the nation’s Air traffic control system, electricity-generating companies, or a telecommunications infrastructure.
  • 11. 11 Cyber warfare The term, cyberwarfare, describes an attack whose goal ranges from disabling a government’s computer network to crippling a country. Cyber terrorism and Cyber warfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.
  • 12. Computer Viruses, • A computer virus is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
  • 13. Worms, Trojan Horses, and Rootkits • A worm is a program that copies itself Repeatedly, cause files damages. • A Trojan horse that hides within or looks like a legitimate program. A certain condition triggers it. • A rootkit is a program that hides in a computer and allows someone from a remote location to take full control of the computer.
  • 14. Safeguards against Computer Viruses and Other Malware • Do not start a computer with removable media inserted in the drives or plugged in the ports. • Never open an e-mail attachment unless you are expecting the attachment and it is from a trusted source. • Should set the macro security so that the application software warns users that contains viruses in Micros. • Should install an antivirus program and update it frequently.
  • 15. BOT/Bot Net • A botnet is a group of compromised computers connected to a network attacks other networks, usually for wicked purposes. A bot is a program that performs a repetitive task on a network. DoS attack DoS attack, is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. DDoS attacks have been able to stop operations temporarily at numerous Web sites, including powerhouses such as Yahoo!, eBay, Amazon.com, and CNN.com
  • 16. • A back door is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network. Root Kit is a Backdoor. Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. Several types of spoofing schemes exist. One type, called e-mail spoofing, occurs when the sender’s address or other components of the e-mail header are altered so that it appears the e-mail originated from a different sender.
  • 17. Safeguards against Botnets, DoS/DDoS Attacks, Back Doors, and Spoofing • A firewall is hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet. A honeypot is a vulnerable computer that is set up to entice an intruder to break into it. These computers, which appear real to the intruder, actually are separated safely from the organization’s network.
  • 18. Unauthorized Access and Use • Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities. Safeguards against Unauthorized Access and Use 1. Passwords And User Names 2. CAPTCHA(completely auto mated public turning test to tell computers and humans apart) 3. PIN 4. Biometric Devices 5. . Possesed objects(cards,Badges)
  • 19. Hardware Theft And Vandalisms • Hardware theft is the act of stealing computer equipment. • Hardware vandalism is the act of defacing or destroying computer equipment. Safeguards against Hardware Theft and Vandalism Physical access controls, such as locked doors and windows. Installing Alarms, cables that lock the equipment to a desk, Small locking devices also exist that require a key to access a hard disk or optical disc drive. real time location system (RTLS) to track and identify the location of high-risk or high-value items. One implementation of RTLS places RFID tags in items to be tracked.
  • 20. Software Theft Software theft occurs when someone (1) steals software media, (2) intentionally erases programs, (3) illegally copies a program, or (4) illegally registers and/or activates a program. Safeguards against Software Theft keep original software boxes and media in a secure location. should back up their files and disks regularly, A license agreement is the right to use the software.
  • 21. Information Theft • Information theft occurs when someone steals personal or confidential information. If stolen, the loss of information can cause as much damage as (if not more than) hardware or software theft. Safeguards against Information Theft •Apply user identification and authentication controls. use variety of encryption techniques.
  • 22. Encryption • Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access. To read the data, the recipient must decrypt, or decipher, it into a readable form. An encryption algorithm, or cypher, is a set of steps that can convert plaintext into unreadable ciphertext.
  • 23. System Failure • A system an electrical power variation due to Overvoltage , undervoltage and Noise. It also can cause loss of data , in formation and hardwares. Safeguards against System Failure • Use surge protector, to smooth out minor noise, • Use uninterruptible power supply (UPS), • Fault-tolerant computer • Use RAID to Full Backup.