Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Computer Security
“An overriding concern”
1
Introduction
2
Protection From
3 Availability
Integrity
Confidentiality
Computer Security
Aspects
What are security threats?
Malicious
Code
Malicious
Programs
Hackers
Crackers
4
Malicious Software
Virus
Worm
Trojan
Horse
5
Virus
Programs designed to replicate
Usually have extensions like .exe, .com, .bat etc.
6
Types of Virus
7
• Affects master boot
record
• Infects rapidly
• Difficult to remove
Boot
Sector
• Infects .com & .exe
• Replicates itself
File
Infecting
Worms
Programs to perform destructive computer
processing
Use network connection to spread
8
Worms
9
Fake mails
Remote login
cracking
Trojan Horses
A destructive program
Usually present in downloadable files
Performs like virus and worms
10
Stay Protected
“use protection medium”
11
Security Mechanisms
12
Cryptography
1
Digital
Signature
2
Firewall
3
Cryptography13
Simply hiding original information
from third party
Converts information to unreadable
format for hackers and crackers.
Cryptography techniques14
SKC
• Single Key
• En/de-cryption
PKC
• Two keys
• En/de-cryption
Hash
Functions
• No keys
• As password
Digital Signature15
Digitized form of paper signature
Verifying electronic documents
Firewall
Medium, software, system ,device.
Control over Networks
16
Firewall
protects from
Unwanted
traffic
Vulnerable
system
Information
leak
Virus
Hackers
17
What is security awareness?
18
What is security policy?
19

More Related Content

Computer Security