Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Computer Security
INTRODUCTION
• Computer security has become increasingly
important since the late 1960s, when modems
(devices that allow computers to communicate over
telephone lines) were introduced. In the 1980s, the
development of personal computers exacerbated
the problem by allowing hackers (irresponsible
computerphiles) to gain unlawful access to big
computer systems from the comfort of their own
homes.
Computer security became a common worry as
the Internet grew rapidly in the late twentieth and
early twenty-first centuries. The development of
enhanced security systems tries to reduce such
vulnerabilities, yet computer crime methods are
always evolving, posing new risks.
PROTECTION
• The protection of computer systems and information
from harm, theft, and illegal use is known as computer
security, or cybersecurity.
• Serial numbers, doors and locks, and alarms are
commonly employed to protect computer gear, just as
they are for other important or sensitive equipment.
• Information and system access, on the other hand, are
protected using a variety of strategies, some of which are fairly
complicated.
Four key hazards are addressed by the
security procedures connected to computer
information and access:
(1)data theft from
government
computers, such
as military
secrets;
(2) vandalism, such as a computer virus
destroying data;
(3) fraud, such as bank personnel
routing funds into their own
accounts; and
(4)invasion of privacy, such as unauthorized access to
protected personal financial or medical data from a huge
database.
Computer-Security.pptx
Computer-Security.pptx
What is Cryptography?
Cryptography is the practice of protecting
information through the use of coded
algorithms, hashes, and signatures. The
information can be at rest (such as a file on
a hard drive), in transit (such as electronic
communication exchanged between two or
more parties), or in use (while computing on
data). Cryptography has four primary goals:
•Confidentiality – Makes information
available to only authorized users.
•Integrity – Ensures that information
has not been manipulated.
•Authentication – Confirms the
authenticity of information or the
identity of a user.
•Non-repudiation – Prevents a user
from denying prior commitments or
actions.
Decryption is a process that transforms
encrypted information into its original
format. The process of encryption
transforms information from its original
format — called plaintext — into an
unreadable format — called ciphertext
— while it is being shared or
transmitted.
encryption is the process of encoding
information. This process converts the
original representation of the information,
known as plaintext, into an alternative form
known as ciphertext.
Computer-Security.pptx
What Is Data Encryption: Algorithms, Methods and Techniques
What is security threat is a potential
negative action or event facilitated by
a vulnerability that results in an
unwanted impact to a computer
system or application
What Is Network Security?
Network security incorporates
various technologies, processes,
and devices into a broad strategy
that protects the integrity,
confidentiality, and accessibility of
computer networks.
MALWARE
• [Malware] is a catch-all phrase for any software that is
intended to harm a single machine, server, or computer
network." To put it another way, malware is classified
based on its intended use rather than the technique or
technology used to create it.
• Malware can also be placed "manually" on a
computer by the attackers, either by physical
access or by privilege escalation to achieve
remote administrator access.
Type of Malwares
Malware can be classified in a variety of
ways, the first of which is by how the
malicious software distributes. You've
certainly seen the terms virus, trojan, and
worm used interchangeably, although they
describe three subtly distinct ways malware
can infect target computers, according to
Symantec:
Computer-Security.pptx
Computer-Security.pptx
Computer-Security.pptx
Malware Attack Methods
Each piece of malware has a method of
infection as well as a behavioral
categorization. WannaCry, for example,
is a ransomware worm. And a single
piece of malware can take on multiple
forms with different attack vector.
• Spyware is any software with
malicious behavior that aims to
gather information about a person or
organization and send it to another
entity in a way that harms the user
by violating their privacy,
endangering their device's security,
or other means.
Computer-Security.pptx
Computer-Security.pptx
Computer-Security.pptx
Computer-Security.pptx
Malvertising
When a user clicks on the advertisement, the code
in the advertisement either takes them to a
malicious website or installs malware on their
machine. In some situations, malware hidden in an
ad may run automatically without the user's
knowledge, a practice known as "drive-by
download."
How do I clean malware off my computer?
Follow these six steps to malware removal on a
PC.
1.Step 1: Disconnect from the internet. ...
2.Step 2: Enter safe mode. ...
3.Step 3: Check your activity monitor for malicious
applications. ...
4.Step 4: Run a malware scanner. ...
5.Step 5: Fix your web browser. ...
6.Step 6: Clear your cache.
Computer-Security.pptx
How hackers can be detected?
Look for any suspicious usernames in the
password file and monitor all additions,
especially on a multi-user system.
Suspicious services added to
/etc/services. Opening a backdoor in a
Unix system is sometimes a matter of
adding two text lines. This is
accomplished by modifying /etc/services
as well as /etc/ined.
How do we know if we have
been hacked?
You get signed out of your online accounts
(social media, email, online banking, etc.), or
you try to log in and discover your passwords
don't work anymore. You receive emails or text
messages about login attempts, password
resets, or two-factor authentication (2FA) codes
that you didn't request
What are signs of a hacker?
Am I Hacked?: Clear Warning Signs
•Your email has been sending messages you
didn't create.
•Your passwords have changed without you
knowing.
•Your device is installing the software you didn't
authorize.
•You get fake antivirus messages asking you to
install.
•Your personal data is leaked.
How long does it take to detect a hacker?
In IBM's 2022 data security report, it was reported
that it took an average of 277 days – roughly 9
months – for businesses to identify and report a
data breach. Stolen or compromised credentials
were the most common cause of a data breach in
2022, and these types of attacks took around 327
days to identify.
Can a hacker can be traced?
Tracking hackers down is laborious and
often takes a lot of time, collaboration,
and investigative research. Specialist
cybercrime units need to be assembled
in order to retrieve and analyse any
potential evidence. Encrypted files will
need to be decrypted, deleted files
recovered and passwords cracked.
Computer-Security.pptx
Who do I contact if my computer has
been hacked?
Report the scam to the FTC. Every
complaint and report matters when
trying to stop hackers. Report the issue
to the FBI via their Internet Crime
Complaint Center. And lastly, contact
your State Attorney General's Office.
Is it hard to track hackers?
The very nature of cybercrimes makes them
difficult to track, as well as sometimes difficult
to detect. Through the internet, cyber criminals
can remain anonymous. They do not need to
be physically close to their victims to commit a
crime.
Types of Web Security Threats
Web threats typically include human and
technical manipulation in order to attack. This
attack sometime involves social engineering,
which includes deception of users to act
unknowingly against their own best interests.
What is the definition of phishing?
Phishing is a type of social engineering and cybersecurity attack
where the attacker impersonates someone else via email or other
electronic communication methods, including social networks and
Short Message Service (SMS) text messages, to reveal sensitive
information.
A watering hole attack is a targeted
attack designed to compromise users
within a specific industry or group of
users by infecting websites they
typically visit and luring them to a
malicious site.
Computer worms
 Scripts that run, replicate, and spread autonomously without
the help of a related program.
What is Cybercrime?
Cybercrime refers to any
unlawful activity
conducted via computer
systems. These threats
often use the web to enact
their plans.
Cyberbullying:
Mental abuse of
victims using
threats and
harassment.
Unauthorized data disclosure involves
the release of private information,
such as email leaks, intimate photos,
and significant corporate data leaks.
 Cyber libel: Also known as online
defamation, this can involve attacking
individuals or organizations' reputations.
This can be done through disinformation
(deliberate distribution of inaccurate
information) or misinformation (mistaken
distribution of inaccurate information).
Common Reasons for Web
Threats
 Human error
 Technical error
Tips to Protect Web Service Attacks
a.Always create backups: All valuable data should be copied and
stored safely to prevent data loss in case of an incident.
Websites, device drives, and even web servers can be backed
up.
B. Enable multi-factor authentication (MFA): MFA
allows for additional layers of user authentication
on top of traditional passwords. Organizations
should enable this protection for users, while end-
users should be sure to make use of it.
C. Scan for malware: Regular scans for
infections will keep your computer devices
secured. Personal devices can all be
covered through an antivirus solution like
Kaspersky Total Security. Enterprise
endpoint machines and computer networks
should use this protection as well.
D. Keep all tools, software, and OS up to date:
Computer systems are more vulnerable when
they’ve been unpatched against undiscovered
holes in their programming. Software
developers regularly probe for weaknesses and
issue updates for this purpose. Protect yourself
by downloading these updates.
Smishing is a type of assault that employs text messaging or
SMS to attract your attention. A smishing attack is when a
message arrives on your cell phone via SMS and contains a link to
click or a phone number to call.
Vishing
Vishing follows the same pattern as previous phishing scams.
Assailants are still wanting your personal information or
sensitive company data. A voice call is used to carry out this
attack.
Email Phishing
The most popular sort of phishing is email phishing, which has
been around since the 1990s.
Spam Email

More Related Content

Computer-Security.pptx

  • 2. INTRODUCTION • Computer security has become increasingly important since the late 1960s, when modems (devices that allow computers to communicate over telephone lines) were introduced. In the 1980s, the development of personal computers exacerbated the problem by allowing hackers (irresponsible computerphiles) to gain unlawful access to big computer systems from the comfort of their own homes.
  • 3. Computer security became a common worry as the Internet grew rapidly in the late twentieth and early twenty-first centuries. The development of enhanced security systems tries to reduce such vulnerabilities, yet computer crime methods are always evolving, posing new risks.
  • 5. • The protection of computer systems and information from harm, theft, and illegal use is known as computer security, or cybersecurity. • Serial numbers, doors and locks, and alarms are commonly employed to protect computer gear, just as they are for other important or sensitive equipment. • Information and system access, on the other hand, are protected using a variety of strategies, some of which are fairly complicated.
  • 6. Four key hazards are addressed by the security procedures connected to computer information and access:
  • 7. (1)data theft from government computers, such as military secrets;
  • 8. (2) vandalism, such as a computer virus destroying data;
  • 9. (3) fraud, such as bank personnel routing funds into their own accounts; and
  • 10. (4)invasion of privacy, such as unauthorized access to protected personal financial or medical data from a huge database.
  • 13. What is Cryptography? Cryptography is the practice of protecting information through the use of coded algorithms, hashes, and signatures. The information can be at rest (such as a file on a hard drive), in transit (such as electronic communication exchanged between two or more parties), or in use (while computing on data). Cryptography has four primary goals:
  • 14. •Confidentiality – Makes information available to only authorized users. •Integrity – Ensures that information has not been manipulated. •Authentication – Confirms the authenticity of information or the identity of a user. •Non-repudiation – Prevents a user from denying prior commitments or actions.
  • 15. Decryption is a process that transforms encrypted information into its original format. The process of encryption transforms information from its original format — called plaintext — into an unreadable format — called ciphertext — while it is being shared or transmitted.
  • 16. encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext.
  • 18. What Is Data Encryption: Algorithms, Methods and Techniques
  • 19. What is security threat is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application
  • 20. What Is Network Security? Network security incorporates various technologies, processes, and devices into a broad strategy that protects the integrity, confidentiality, and accessibility of computer networks.
  • 21. MALWARE • [Malware] is a catch-all phrase for any software that is intended to harm a single machine, server, or computer network." To put it another way, malware is classified based on its intended use rather than the technique or technology used to create it.
  • 22. • Malware can also be placed "manually" on a computer by the attackers, either by physical access or by privilege escalation to achieve remote administrator access.
  • 23. Type of Malwares Malware can be classified in a variety of ways, the first of which is by how the malicious software distributes. You've certainly seen the terms virus, trojan, and worm used interchangeably, although they describe three subtly distinct ways malware can infect target computers, according to Symantec:
  • 27. Malware Attack Methods Each piece of malware has a method of infection as well as a behavioral categorization. WannaCry, for example, is a ransomware worm. And a single piece of malware can take on multiple forms with different attack vector.
  • 28. • Spyware is any software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's security, or other means.
  • 33. Malvertising When a user clicks on the advertisement, the code in the advertisement either takes them to a malicious website or installs malware on their machine. In some situations, malware hidden in an ad may run automatically without the user's knowledge, a practice known as "drive-by download."
  • 34. How do I clean malware off my computer? Follow these six steps to malware removal on a PC. 1.Step 1: Disconnect from the internet. ... 2.Step 2: Enter safe mode. ... 3.Step 3: Check your activity monitor for malicious applications. ... 4.Step 4: Run a malware scanner. ... 5.Step 5: Fix your web browser. ... 6.Step 6: Clear your cache.
  • 36. How hackers can be detected? Look for any suspicious usernames in the password file and monitor all additions, especially on a multi-user system. Suspicious services added to /etc/services. Opening a backdoor in a Unix system is sometimes a matter of adding two text lines. This is accomplished by modifying /etc/services as well as /etc/ined.
  • 37. How do we know if we have been hacked? You get signed out of your online accounts (social media, email, online banking, etc.), or you try to log in and discover your passwords don't work anymore. You receive emails or text messages about login attempts, password resets, or two-factor authentication (2FA) codes that you didn't request
  • 38. What are signs of a hacker? Am I Hacked?: Clear Warning Signs •Your email has been sending messages you didn't create. •Your passwords have changed without you knowing. •Your device is installing the software you didn't authorize. •You get fake antivirus messages asking you to install. •Your personal data is leaked.
  • 39. How long does it take to detect a hacker? In IBM's 2022 data security report, it was reported that it took an average of 277 days – roughly 9 months – for businesses to identify and report a data breach. Stolen or compromised credentials were the most common cause of a data breach in 2022, and these types of attacks took around 327 days to identify.
  • 40. Can a hacker can be traced? Tracking hackers down is laborious and often takes a lot of time, collaboration, and investigative research. Specialist cybercrime units need to be assembled in order to retrieve and analyse any potential evidence. Encrypted files will need to be decrypted, deleted files recovered and passwords cracked.
  • 42. Who do I contact if my computer has been hacked? Report the scam to the FTC. Every complaint and report matters when trying to stop hackers. Report the issue to the FBI via their Internet Crime Complaint Center. And lastly, contact your State Attorney General's Office.
  • 43. Is it hard to track hackers? The very nature of cybercrimes makes them difficult to track, as well as sometimes difficult to detect. Through the internet, cyber criminals can remain anonymous. They do not need to be physically close to their victims to commit a crime.
  • 44. Types of Web Security Threats Web threats typically include human and technical manipulation in order to attack. This attack sometime involves social engineering, which includes deception of users to act unknowingly against their own best interests.
  • 45. What is the definition of phishing? Phishing is a type of social engineering and cybersecurity attack where the attacker impersonates someone else via email or other electronic communication methods, including social networks and Short Message Service (SMS) text messages, to reveal sensitive information.
  • 46. A watering hole attack is a targeted attack designed to compromise users within a specific industry or group of users by infecting websites they typically visit and luring them to a malicious site.
  • 47. Computer worms  Scripts that run, replicate, and spread autonomously without the help of a related program.
  • 48. What is Cybercrime? Cybercrime refers to any unlawful activity conducted via computer systems. These threats often use the web to enact their plans.
  • 49. Cyberbullying: Mental abuse of victims using threats and harassment.
  • 50. Unauthorized data disclosure involves the release of private information, such as email leaks, intimate photos, and significant corporate data leaks.
  • 51.  Cyber libel: Also known as online defamation, this can involve attacking individuals or organizations' reputations. This can be done through disinformation (deliberate distribution of inaccurate information) or misinformation (mistaken distribution of inaccurate information).
  • 52. Common Reasons for Web Threats  Human error  Technical error Tips to Protect Web Service Attacks a.Always create backups: All valuable data should be copied and stored safely to prevent data loss in case of an incident. Websites, device drives, and even web servers can be backed up.
  • 53. B. Enable multi-factor authentication (MFA): MFA allows for additional layers of user authentication on top of traditional passwords. Organizations should enable this protection for users, while end- users should be sure to make use of it.
  • 54. C. Scan for malware: Regular scans for infections will keep your computer devices secured. Personal devices can all be covered through an antivirus solution like Kaspersky Total Security. Enterprise endpoint machines and computer networks should use this protection as well.
  • 55. D. Keep all tools, software, and OS up to date: Computer systems are more vulnerable when they’ve been unpatched against undiscovered holes in their programming. Software developers regularly probe for weaknesses and issue updates for this purpose. Protect yourself by downloading these updates.
  • 56. Smishing is a type of assault that employs text messaging or SMS to attract your attention. A smishing attack is when a message arrives on your cell phone via SMS and contains a link to click or a phone number to call.
  • 57. Vishing Vishing follows the same pattern as previous phishing scams. Assailants are still wanting your personal information or sensitive company data. A voice call is used to carry out this attack.
  • 58. Email Phishing The most popular sort of phishing is email phishing, which has been around since the 1990s.