Top Banner
Computer Security By Shahzad Younas Superior University Depalpur -Mail: [email protected]
41

Computer security and malware by shahzad younas

Aug 13, 2015

Download

Education

Shahzad Younas
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computer security and malware by shahzad younas

Computer Security

By Shahzad Younas Superior University Depalpur

E-Mail: [email protected]

Page 2: Computer security and malware by shahzad younas
Page 3: Computer security and malware by shahzad younas

Topic : Computer Security Group Name: Anmol Group

Group Leader Shahzad Younas

Group MembersAnsar SohailAli ShahzadFiaz Tabish

Page 4: Computer security and malware by shahzad younas

ObjectivesComputer Security Computer Security CIA Trail CIA Trail Malware Malware

Email Related Issue

Email Related Issue Cyber VillainsCyber Villains ProtectionProtection

AuthenticationAuthentication ReferencesReferences

Page 5: Computer security and malware by shahzad younas

Computer Security

Computer security is the field

which tries to keep computer

safe and secure.

Page 6: Computer security and malware by shahzad younas

What does it mean to be secure?

• Include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy.

Page 7: Computer security and malware by shahzad younas

CIA Trial It is combination of principles.

Security Objectives:ConfidentialityAvailabilityIntegrity

Page 8: Computer security and malware by shahzad younas

Confidentiality

• The information must just be accessible to the authorized people

• Confidentiality is keeping information secret or private.

• Confidentiality might be important for military, business or personal reasons.

Page 9: Computer security and malware by shahzad younas

Integrity

• Integrity is the unauthorized writing or modification of information.

• Guarantee that the data is what we expect.

• Messages can’t be modified without detection.

Page 10: Computer security and malware by shahzad younas

Availability

• System and networks must be up and running.

• Availability is the prevention of unauthorized withholding of information.

Page 11: Computer security and malware by shahzad younas

Malware• Malware  (short for malicious software)is any

software specifically designed to damage a computer

system without owner knowledge.

Examples:Trojan Horses

Viruses

Worm

Page 12: Computer security and malware by shahzad younas

Trojan Horse• A Trojan Horse is program that is

packaged with a useful application, usually free, such as a screen or game saver, but carries a destructive virus, that creates problems for your computer without your knowledge.

Page 13: Computer security and malware by shahzad younas

Trojan Horse

Page 14: Computer security and malware by shahzad younas

Some example of Trojan Horse

– TrojanDownloader:Win32/Zlob.gen!dll– Trojan.Popuper.origin– Downloader.Zlob.LI

Page 15: Computer security and malware by shahzad younas

Virus• A computer virus is small software program

that can spread from one computer system to another and cause interferences with computer operations. 

Page 16: Computer security and malware by shahzad younas

Worm

• A worm is a type of malicious software (malware) that copies itself repeatedly into a computers memory.

Page 17: Computer security and malware by shahzad younas

Email Related Issues

• Spam

• Phishing

• Pharm

• Web jack

Page 18: Computer security and malware by shahzad younas

Spam• Spam is flooding the Internet with many copies of the

same message, in an attempt to force the message on people who would not otherwise choose to receive it.

• It is also known as Bulk-email or Junk email

Page 19: Computer security and malware by shahzad younas

Spam

Page 20: Computer security and malware by shahzad younas

Phishing:

Example: • You type, by mistake, “gmale.com” instead of

“gmail.com”• gmale.com designs the site to look like

gmail.com so the user types in their info as usual

• BAD! Now an evil person has your info!

A fake login page to be a trusted login page.

Page 21: Computer security and malware by shahzad younas
Page 22: Computer security and malware by shahzad younas

Pharm• Software that's planted on a computer; redirects to impostor web

page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http.

Page 23: Computer security and malware by shahzad younas
Page 24: Computer security and malware by shahzad younas

Hacker

• Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems.

Page 25: Computer security and malware by shahzad younas

Cracker• A cracker also a someone who access a computer or

network illegally but has the intent of destroying data, stealing information or other malicious action.

• Both hacker and cracker have advanced computer and network skills.

Page 26: Computer security and malware by shahzad younas

Cyber terrorism• Cyber terrorism can be also defined as the intentional

use of computer, networks, and public internet to cause destruction and harm for personal objectives. Objectives may be political or ideological since this can be seen as a form of terrorism.

Page 27: Computer security and malware by shahzad younas

Hacker Activists• "Hacker Activists" are people with a politically or socially

motivated purpose who break into a computer system. "Hacker Activists" are people with a politically or socially motivated purpose who break into a computer system.

Page 28: Computer security and malware by shahzad younas

Protection

AntivirusFirewallEnctyption

Page 29: Computer security and malware by shahzad younas

Antivirus

• Scans primary and secondary storage Devices.• Detect & Destroy them.• Keep update antivirus software.

It works in 2 ways:

1. It scans files to look for known viruses to compare to a virus dictionary.

2. It analyzes suspicious behavior of computer programs

Page 30: Computer security and malware by shahzad younas

Antivirus Software

• http://free.grisoft.com (AVG Antivirus Free)

• http://www.symantec.com/nav/nav_9xnt/ (Norton Antivirus)

• http://www.sophos.com/products/sav/ (Sophos Antivirus)

• http://www.pandasoftware.com/home/default.asp (Titanium Antivirus)

• http://www.trendmicro.com/en/home/us/personal.htm (Trend Micro PC-cillin)

• http://www.mcafee.com (McAfee VirusScan)

Online Antivirus Checkups•http://housecall.trendmicro.com/•http://www.pandasoftware.com/products/activescan.htm

Some links where we can find free antivirus software.

Page 31: Computer security and malware by shahzad younas

Firewall• Windows Firewall (or any other firewall) can help alert

you to suspicious activity if a virus or worm attempts to connect to your computer. It can also block viruses, worms, and hackers from attempting to download potentially harmful programs to your computer.

Page 32: Computer security and malware by shahzad younas

Some Firewall Software• http://www.zonealarm.com (ZoneAlarm)• http://www.mcafee.com (McAfee Personal Firewall)• http://www.symantec.com/sabu/nis/npf/ (Norton Personal Firewall)

Page 33: Computer security and malware by shahzad younas

Encryption• Turning readable data into a form of unreadable data in

order to prevent access that is not authorized Often used in the military.

Page 34: Computer security and malware by shahzad younas

Authentication

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be.

Examples:

• Password

• Biometrics

• Palm/Finger Print

Page 35: Computer security and malware by shahzad younas

Password• A password or watchword is a form of authentication used to guard

or control a "resource"

Tips for Creating Secure Passwords• http://www.microsoft.com/athome/security/privacy/password.mspx• http://www.us-cert.gov/cas/tips/ST04-002.html• http://www.symantec.com/homecomputing/library/pass_w.html

Use complex password:

Hint: iMnew145

Page 36: Computer security and malware by shahzad younas

Biometrics

• Biometrics is the science of measuring of human physical or behavioral characteristics.

Page 37: Computer security and malware by shahzad younas

Palm/Finger Print• Palm/Finger print scanning is a unique way to protect

your privacy. You run your finger across a window or sensor to identify yourself.

Page 38: Computer security and malware by shahzad younas

Iris/Face

• Iris/ face scans are very reliable identifiers. Each individual person has different eyes and face shape, making this type of scan very effective.

Page 39: Computer security and malware by shahzad younas

Voice• A systems that extract features from speech patterns in

order to recognize someone's voice which is then digitalized and stored

Page 40: Computer security and malware by shahzad younas

References

• (http://www.pcworld.com/article/id,144017-c,internetlegalissues/article.htm)

• (http://en.wikipedia.org/wiki/Firewall_(networking))• http://www.questbiometrics.com•  http://www.nationalbiometric.org/• http://www.news.com/2100-1001-205144.html

Page 41: Computer security and malware by shahzad younas