Top Banner
36

Basic security concepts of computer army themed

Feb 12, 2017

Download

Career

Faizan Janjua
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Basic security concepts of computer army themed
Page 2: Basic security concepts of computer army themed

TEAM # 1#101 Mohammed Aqib Rasheed#102 Mohammed Talha Hamid#103 Mohammed Faizan Iftikhar

Page 3: Basic security concepts of computer army themed

TOPIC OF PRESENTATIONBASIC SECURITY CONCEPT

OF COMPUTER

Page 4: Basic security concepts of computer army themed

CONTENT LIST• BASIC SECURITY CONCEPT OF

COMPUTER.• THREATS.• THREATS TO COMPUTER HARDWARE.• THREATS TO COMPUTER USER.• THREATS TO COMPUTER DATA.• VULNERABILITY AND

COUNTERMEASURE.• SOFTWARE SECURITY.• QUESTIONING SESSION.

Page 5: Basic security concepts of computer army themed

BASIC SECURITY CONCEPTOF COMPUTER• WHAT IS COMPUTER SECURITY?• IMPORTANCE OF COMPUTER SECURITY.• COMPONENTS OF COMPUTER SECURITY.1. THREATS.2. VULNERABILITY.3. COUNTER MEASURE.

Page 6: Basic security concepts of computer army themed

THREATS TO COMPUTER SECURITY• DEFINE THREAT?• TYPES OF THREAT.1. THREATS TO COMPUTER HARDWARE.2. THREATS TO COMPUTER USER.3. THREATS TO COMPUTER DATA.

Page 7: Basic security concepts of computer army themed

THREATS TO COMPUTER HARDWARE• POWER RELATED THREATS .• THEFTS AND VANDALISM.• DESASTER AND AGE.

Page 8: Basic security concepts of computer army themed

POWER RELATEDTHREATS

• POWER FLUCTUATION.• POWER FAILURE.• ELECTRICAL SURGE.

Page 9: Basic security concepts of computer army themed

COUNTERMEASURE AGAINST PRP

• SURGE SUPPRESSORS.• LINE CONDITIONERS.• UNINTERRUPTIBLE POWER SUPPLIES.

Page 10: Basic security concepts of computer army themed

THEFT AND VANDALISM• HARDWARE THEFT.• HARDWARE VANDALISM.1. DO TREMENDOUS DAMAGE.2. LOSS OF SYSTEM.3. LOSS OF STORAGE DATA.

Page 11: Basic security concepts of computer army themed

COUNTERMEASURE AGAINST THEFT AND VANDALISM• PRECAUTIONS TO PROTECT PC.• SECURE AREA.• SPECIAL LOCKS.• ALARM SYSTEM.• CABELS.

Page 12: Basic security concepts of computer army themed

DISASTER AND AGE

• EARTHQUACK, TSUNAMI.• SNOWSTROMS, LIGHTINING, TORNEDO.• SITE DISASTER.• CIVIL DISASTER.• AGE.

Page 13: Basic security concepts of computer army themed

THREATS TO COMPUTER USER

• IDENTITY THEFTS.• LOSS OF PRIVACY.• ONLINE SPYING TOOLS.• SPAMS.• COMPUTER RELATED INJURIES.

Page 14: Basic security concepts of computer army themed

IDENTITY THEFT• USING NAME, SOCIAL SECURITY NUMBERS,

CREDIT CARD INFO.• HACKS BANK ACCOUNTS, DRIVING LICENSE,

IMPORTANT DOCUMENTS.• METHODS USED BY THEIVIES.1. SHOULDER SURFING2. SNAGGING.3. DUMPSTER DIVING.4. SOCIAL ENGINEERING.5. HIGH-TECH METHODS.

Page 15: Basic security concepts of computer army themed

LOSS OF PRIVACY

• DATA MINING AND ITS USE.

1. CRIMINAL RECORDS.2. BACKGROUND INFORMATION.3. ACCOUNT NUMBERS AND PASSWORDS.

Page 16: Basic security concepts of computer army themed

ONLINE SPYING TOOLS• INTERNET MONITORING.• ONLINE PROFILING.• COOKIES.• WEB BUGS.• SPYWARE.

Page 17: Basic security concepts of computer army themed

SPAM

• UNSOLICITED COMMERCIAL E-MAIL.• PERCENTAGE OF JUNK MAIL.• SPAMMERS ACQUIRE ADDRESSES USING

MANY METHODS.• CAN-SPAM ACT PASSED IN 2003.• ANTI-SPAM SOFTWARES.

Page 18: Basic security concepts of computer army themed

COMPUTER RELATED INJURIES• ERGONOMICS.• RSI:1. KEYBOARD INJURIES.2. EYESTRAIN.

Page 19: Basic security concepts of computer army themed

THREATS TO COMPUTER DATA IMPORTANCE OF DATA.• TYPES OF DATA.1. PERSONAL DATA.2. FORMAL AND SECURITY DATA.• THREATS TO DATA.• PROTECTION OF DATA.

Page 20: Basic security concepts of computer army themed

THREATS TOCOMPUTER DATA

• MALWARE,VIRUSES,MALICIOUS PROGRAMS.• CYBER CRIME.• HACKING.• CYBERTERRORISM.

Page 21: Basic security concepts of computer army themed

MALWARE• WHAT IS MALWARE?• THREAT TO DATA AND

INFORMATION. • VIRUSES.• WORMS.• TROJAN HORSE ATTACK

APPLETS.

Page 22: Basic security concepts of computer army themed

CYBERCRIME• WHAT IS CYBERCRIME?• A GROWING MENCE.• CRIMINAL ACTIONS.1. FRAUDULENT BANK WEBSITES.2. CREDIT AND DEBIT FRAUD.

Page 23: Basic security concepts of computer army themed

HACKING• WHAT IS HACKING?• EFFECT OF HACKING.• DDOS ATTACKS.• COMMON HACKING METHODS.1. SNIFFING.2. SOCIAL ENGINEERING.3. SPOOFING.

Page 24: Basic security concepts of computer army themed

CYBER TERRORISM

• WHAT IS CYBERWARFARE AND CYBERTERRORISM?• CYBERTERRORISM COUNTERING.• CIPB(CRITICAL INFRASTRUCTURE PROTECTION BOARD).• CERT(COMPUTER EMERGENCY RESPONSE TEAM).

Page 25: Basic security concepts of computer army themed

VULERABILITY AND COUNTERMEASURE• WHAT IS TERM VULNERABILITY?• WHAT IS COUNTERMEASURE FOR COMPUTER

SECURITY?• CLASSES OF COUNTERMEASURE.1. SHIELDING FROM PERSONAL HARMS.2. SAFGUARDING FROM PHYSICAL HAZARDS.

Page 26: Basic security concepts of computer army themed

Software Security

Page 27: Basic security concepts of computer army themed

What is a Software?• Software, in simple words,  is a collection

of instructions that enable the user to interact with a computer, its hardware, or perform tasks. Without software, computers would be useless.

• Examples are AVG, Windows 7, Outlook, Computer drivers etc.

Page 28: Basic security concepts of computer army themed

Types of Software• There are two main types of software:-

1)Application software:Application software are often called productivity

programs or end-user programs because they enable the user to complete tasks such as creating documents, spreadsheets, databases, and publications, doing online research, sending email, designing graphics etc.

Examples are Microsoft Excel, Outlook, Skype etc.

Page 29: Basic security concepts of computer army themed

2) System Software:Systems software includes the programs that

are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system (or DOS). Without systems software installed in our computers we would have to type the instructions for everything we wanted the computer to do!

Examples are Microsoft Windows, Mac OS X, LINUX etc.

Page 30: Basic security concepts of computer army themed

Software Security

• Software security:-Software security is an idea implemented to

protect software against malicious attack and other hacker risks so that the software continues to function correctly under such potential risks. Security is necessary to provide integrity, authentication and availability.

Page 31: Basic security concepts of computer army themed

• Why do we need software security?

Any compromise to integrity, authentication and availability makes a software unsecure. Software systems can be attacked to steal information, monitor content, introduce vulnerabilities and damage the behavior of software. Malware can cause DoS (denial of service) or crash the system itself.  Buffer overflow, stack overflow, command injection and SQL injections are the most common attacks on the software

Page 32: Basic security concepts of computer army themed

• Command injection can be achieved on the software code when system commands are used predominantly. New system commands are appended to existing commands by the malicious attack.

• The only way to avoid such attacks is to practice good programming techniques. System-level security can be provided using better firewalls. Using intrusion detection and prevention can also aid in stopping attackers from easy access to the system.

Page 33: Basic security concepts of computer army themed

Pros and cons ofsoftware security• Advantages:The advantages of software security are as follows:-

1) Protects system against viruses, worms, spyware and other unwanted programs.2) Protection against data from theft.3) Protects  the computer from being hacked.4) Minimizes computer freezing and crashes.5) Gives privacy to users.

Page 34: Basic security concepts of computer army themed

• Disadvantages:Following are the disadvantages of software

security:-

1)Firewalls can be difficult to configure correctly.2) Incorrectly configured firewalls may block users from performing certain actions on the Internet, until the firewall configured correctly.3) Makes the system slower than before.4) Need to keep updating the new software in order to keep security up to date.5) Could be costly for average user.

Page 35: Basic security concepts of computer army themed

QUESTIONINGSESSION

Any Questions???

Page 36: Basic security concepts of computer army themed

THANKS...