Computer , Internet and physical security.

78
Computer Security Internet Security Physical Security

description

It refers to protection of a computer and the information stored in it, from the unauthorised users. Computer security is a branch of computer technology known as information security as applied to computers and networks. 

Transcript of Computer , Internet and physical security.

Page 1: Computer , Internet and physical security.

Computer SecurityInternet SecurityPhysical Security

Page 2: Computer , Internet and physical security.

Computer Security

Page 3: Computer , Internet and physical security.

Computer Security

Page 4: Computer , Internet and physical security.

Computer Security

• It refers to protection of a computer and the information stored in it, from the unauthorised users.

Page 5: Computer , Internet and physical security.

Computer Security

• It refers to protection of a computer and the information stored in it, from the unauthorised users.

• Computer security is a branch of computer technology known as information security as applied to computers and networks. 

Page 6: Computer , Internet and physical security.

Security Threats

Page 7: Computer , Internet and physical security.

Security Threats

1 Malicious Code and Software

2 Hackers and Crackers

Page 8: Computer , Internet and physical security.

Malicious Code and Software

Page 9: Computer , Internet and physical security.

Malicious Code and Software

• It is a software program that generates threats to the computers and data stored on it.

Page 10: Computer , Internet and physical security.

Malicious Code and Software

• It is a software program that generates threats to the computers and data stored on it.

• This code can be in the form of worms ,logic bombs, viruses, Trojan horses and other type of software.

Page 11: Computer , Internet and physical security.

Malicious Code and Software

Page 12: Computer , Internet and physical security.

Hackers and Crackers

Page 13: Computer , Internet and physical security.

Hackers and Cracker

Page 14: Computer , Internet and physical security.

Hackers and Cracker

Page 15: Computer , Internet and physical security.

Hackers and Cracker

• A hacker is a person who breaks into computers without authorisation. He is actively involved in computer security and are non professional or programmers without formal training.

Page 16: Computer , Internet and physical security.
Page 17: Computer , Internet and physical security.
Page 18: Computer , Internet and physical security.

Malicious Program

Page 19: Computer , Internet and physical security.

Malicious Program

• Any computer program or code that is designed to do harm, can be termed a malicious program. Ex – Virus , Worms , Trojan horse , Logic bomb , Spyware etc.

Page 20: Computer , Internet and physical security.

Virus

Page 21: Computer , Internet and physical security.

Virus

• It is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. Virus has the ability to infect different parts of the computer.

Page 22: Computer , Internet and physical security.
Page 23: Computer , Internet and physical security.

Worms

Page 24: Computer , Internet and physical security.

Worms

Page 25: Computer , Internet and physical security.

Worms

• A computer worm is a self-replicating computer designed to destroy data. Worm program often use network connections to spread from one computer to another computer system. Thus, worms attack systems that are linked through communication lines.

Page 26: Computer , Internet and physical security.
Page 27: Computer , Internet and physical security.

Logic Bomb

Page 28: Computer , Internet and physical security.

Logic Bomb

Page 29: Computer , Internet and physical security.

Logic Bomb

• This is one of the oldest types of programs and it embeds its code into legitimate programs. Like a bomb it explodes all the data when certain conditions are met. This could be either destroying or deletion of certain files on a particular time, and so on. It reacts as a time bomb.

Page 30: Computer , Internet and physical security.
Page 31: Computer , Internet and physical security.

Trojan Horses

Page 32: Computer , Internet and physical security.

Trojan Horses

Page 33: Computer , Internet and physical security.

Trojan Horses

Page 34: Computer , Internet and physical security.

Trojan Horses

• Trojan appears to perform a desirable function but in fact, performs undisclosed, malicious function. These programs enter into a computer through an e-mail or free programs that are download from the internet.

Page 35: Computer , Internet and physical security.

Trojan Horses

• Trojan appears to perform a desirable function but in fact, performs undisclosed, malicious function. These programs enter into a computer through an e-mail or free programs that are download from the internet.

• Once they safely pass into the computer, they may lie inactive from months before they activated or complete control of the computer is given to a hacker.

Page 36: Computer , Internet and physical security.

• It allows unauthorised access to the host machine, giving them ability to save their files on the user’s computer or even to watch the user’s screen and to control the computer.

Page 37: Computer , Internet and physical security.
Page 38: Computer , Internet and physical security.

Antivirus

Page 39: Computer , Internet and physical security.

Antivirus

• It is a software utility which mainly prevents and removes computer viruses, including worms and Trojan horses. It scan the hard disk for viruses and tries to removes them, if found.

Page 40: Computer , Internet and physical security.

Antivirus

Page 41: Computer , Internet and physical security.

Antivirus Protection

Page 42: Computer , Internet and physical security.

Security techniques from hacker and crackers

Page 43: Computer , Internet and physical security.

Security techniques from hacker and crackers

• Cryptography• Captcha

Page 44: Computer , Internet and physical security.

Cryptography

Page 45: Computer , Internet and physical security.

Cryptography

• Cryptography is the process of alternating the original massages to hide their meaning from opponents who might intercept them.

Page 46: Computer , Internet and physical security.

Cryptography

• Cryptography is the process of alternating the original massages to hide their meaning from opponents who might intercept them.

• Cryptography relies upon to basic components an algorithm and key.

• Some of the algorithm are given here. 1 Secret Key Cryptography 2 Public Key cryptography 3 Hash Function 4 Digital Signature

Page 47: Computer , Internet and physical security.

Secret Key Cryptography

Page 48: Computer , Internet and physical security.

Secret Key Cryptography

• A single key is used in SKC for both encryption and decryption of data. In this form of cryptography the key must be known the sender and receiver.

Page 49: Computer , Internet and physical security.

Public Key Cryptography

Page 50: Computer , Internet and physical security.

Public Key Cryptography

• Each person in this techniques gets known as the public and private key. Each person’s public key is publicly known and private key kept secret.

• The sender uses the receiver’s public key to encrypt the message and when receiver receives the encrypted massage , he uses his private key to decrypt the massage.

Page 51: Computer , Internet and physical security.
Page 52: Computer , Internet and physical security.

Hash Function

Page 53: Computer , Internet and physical security.

Hash function

• It is also called massage digests and it is a one way encryption algorithm that does not use any key to encrypt or decrypt the massage.

• It uses a digital fingerprint of a file’s contents, in order to ensure that the file has not been changed by an intruder or any type of virus.

Page 54: Computer , Internet and physical security.

Digital Signature

Page 55: Computer , Internet and physical security.

Digital Signature

• Digital signature uses the public key cryptography technique. It uses two different keys in an algorithm but these are mathematically related to each other. One is for digital signature creation and another key for verifying a digital signature.

Page 56: Computer , Internet and physical security.
Page 57: Computer , Internet and physical security.
Page 58: Computer , Internet and physical security.

Captcha

• It’s full name is “Completely Automated Public Turing test to tell Computers and Humans Apart”.

• In modern computers, a robot or an automated program generates undesired information in the web pages and websites.

• A Captcha is a type of test in computing to make sure that the response is not generated by a computer.

• A Captcha is a program that generates images images that human can understand but a program cannot.

Page 59: Computer , Internet and physical security.
Page 60: Computer , Internet and physical security.

Internet Security

Page 61: Computer , Internet and physical security.

Internet Security

• Internet Security is a branch of information technology known as information security as applied to computers and networks.

Page 62: Computer , Internet and physical security.

OSI Reference Model

• Its full name is Open System Interconnection.

• The International Standards Organization developed in the early 1980 to promote interoperability of network devices.

• It has seven layer.

Page 63: Computer , Internet and physical security.

Seven layer of OSI model

• Application Layer• Presentation Layer• Session Layer• Transport Layer• Network Layer• Data Link Layer• Physical Layer

Page 64: Computer , Internet and physical security.

Security for the OSI Model

Page 65: Computer , Internet and physical security.

Security for the OSI Model

• Authentication• Access Control• Logging and Monitoring• Data Integrity• Data Confidentiality

Page 66: Computer , Internet and physical security.

TCP/IP Reference Model

Page 67: Computer , Internet and physical security.

TCP/IP Reference Model

• TCP/IP is based a four layer reference model.

• It is proposed by ISO(International Standards Organization).

• Layers of TCP/IP model Application Layer Transport Layer Internet Layer Network Interface layer

Page 68: Computer , Internet and physical security.

Security for TCP/IP Model

Page 69: Computer , Internet and physical security.

Security for TCP/IP Model

• Routers :- A router is a network traffic management device designed to forward the packets. It consists of hardware and software to implement the task for forwarding the packets.

• Firewall :- Firewall is a system has been designed to prevent the unauthorized access to or from a private network.

Page 70: Computer , Internet and physical security.

Physical Security

Page 71: Computer , Internet and physical security.

Physical Security

• The connection between physical system and logical systems ensure that, in order to protect logical systems, the hardware which is alive at that time must be physically secured.

• It involves protecting sites from natural and man-made physical threats.

Page 72: Computer , Internet and physical security.

Physical Security Threats

Page 73: Computer , Internet and physical security.

Physical Security Threats

• Weather : floods, fire, snow, ice, heat, cold

• Earth movement : earthquakes, mudslides

• Structural Failure : building collapse• Fire/chemical : explosions, smoke • Energy : loss of power, radiation,

magnetic wave infrastructure • Biological : virus, infections of animal

and insects

Page 74: Computer , Internet and physical security.

Educating Personal

• An organization can educate its staff members on the importance of their physical security through the use of self-paced or formal instructions, security education bulletins , posters, training films and tape or awareness data that drive home the importance of constant vigilence.

Page 75: Computer , Internet and physical security.

Administrative Access Control

• This is an important category of physical access control. It addresses the procedural application of physical controls. There exist different type of physical control devices that make a site more secure.

Page 76: Computer , Internet and physical security.

Physical Security Controls

• This is the next category of the physical access control which includes mechanical and electronic access controls such as gates, doors, keys and combination locks. By physical security, most people understand these types of access control because these devices are the least complicated and expensive.

Page 77: Computer , Internet and physical security.

Technical Controls

• The next category of physical security control is the use of computer hardware and software. Some of the technical security measures are discussed here. A smart card, which is similar to regular payment card, access card, the smart card has many purpose, such as medical identification, travel ticketing identifiction and builiding access control.

Page 78: Computer , Internet and physical security.

The End(Follow me for more updates)