Computer securety
-
Upload
rushil-ahmed -
Category
Engineering
-
view
93 -
download
0
Transcript of Computer securety
![Page 1: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/1.jpg)
![Page 2: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/2.jpg)
COMPUTER SECURITY & SAFETY ETHICS & PRIVACY
Bangladesh University Of Business & Technology
Faculty Of Bachelor Of Business Administration
Group name: Firewall
Presented By: Samia NizameID NO:14152101343 Marjana Ahmed ID NO: 14152101341
![Page 3: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/3.jpg)
Presentation Outline Computer Security
Risk Computer Crime 7basic categories of
cyber crime Computer Viruses Computer Worms Trojan Horses Rootkit Symptoms Safeguards
DoS attack Back Doors Spoofing Firewalls References
![Page 4: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/4.jpg)
Computer Security Risks
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability
1
![Page 5: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/5.jpg)
Computer CrimeAn intentional breach of computer security
often involves a deliberate act that is against the law
Any illegal act involving a computer generally is referred to as a computer crime
2
![Page 6: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/6.jpg)
7basic categories of cyber crime (1/2)
Hacker groups: Usually work anonymously and create tools for hacking.
Cracker: Someone who accesses a computer or network illegally but has the intent of destroying data, information or other malicious action
Script Kiddie: A wannabe hacker, Someone who wants to be a hacker but lacks any serious technical expertise
Cyber Terrorist: Someone who uses the internet or network to destroy or damage computers for political reasons
3
![Page 7: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/7.jpg)
7basic categories of cyber crime (2/2) Corporate Spies: Some corporate spies have
excellent computer & networking skills & are hired to break into specific computer & steal its proprietary data & information
Unethical Employees: They break into their employers’ computers for a variety of reasons
Cyber extortionist: Someone who uses e-mail as a vehicle for extortion
4
![Page 8: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/8.jpg)
Computer Viruses Is a small program that affects or infects, a computer
negatively by altering the way the computer works without the users knowledge
It can damage files & system software including the operating system
Viruses name: Macro Virus, Boot Virus, Network Virus, FAT Virus, Logic Bombs
5
![Page 9: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/9.jpg)
Computer Worms It is a program that copies itself
repeatedly, for example in memory or on a network, using up resources & possibly shutting down the computer or network
6
![Page 10: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/10.jpg)
Trojan Horses
A trojan horse named after the Greek myth is a program that hides within or looks like a legitimate program
A trojan horse does not replicate itself to other computers 7
![Page 11: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/11.jpg)
Rootkit It is a program that
hides in computer & allows someone from a remote location to take full control of the computer
8
Once the rootkit its installed, the rootkit author can execute programs, change settings, monitor activity, and access files on the remote computer
![Page 12: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/12.jpg)
Symptoms (1/2) Operating system runs much slower
than usual Available memory is less than
expected Files become corrupted Screen display unusual message or
image Music or unusual sound plays
randomly9
![Page 13: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/13.jpg)
Symptoms (2/2) Unknown programs or files
mysteriously appear Existing programs & files disappear System properties change Operating system does not start up Operating system shuts down
unexpectedly
10
![Page 14: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/14.jpg)
Safeguards against computer viruses & other Malware (1/2) Never start a computer with removable media
inserted in the drives of plugged in the ports, unless the media are uninfected
Never open an e-mail attachment unless you are expecting it & is from a trusted source
Set the macro security in program so that you can enable or disable macros
Install an antivirus program on all of your computers
11
![Page 15: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/15.jpg)
Scan all downloaded programs for viruses & other malware If the antivirus program flags an e-mail attachment as infected, delete or quarantine the attachment immediatelyBefore using any removable media, scan the media for malware Install a personal firewall program Stay informed about new virus alerts & virus hoaxes
Safeguards against computer viruses & other Malware (2/2)
12
![Page 16: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/16.jpg)
DoS attackA denial of service attack or
DOS attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail
For example, they may use an unsuspecting computer to send an influx of confusing data messages or useless traffic to a computer network
13
![Page 17: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/17.jpg)
Back DoorsA back door is a program or set of instructions
in a program that allow users to bypass security controls when accessing a program, computer or network
Which allows them to continue to access the computer remotely without the user’s knowledge
14
![Page 18: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/18.jpg)
SpoofingIn the context of network security, a
spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage
Example: E-mail spoofing IP address spoofing
15
![Page 19: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/19.jpg)
Firewalls
A firewall is hardware & software that protects a network’s resources from intrusion by users on another network such as the Internet
All networked & online computer users should implement a firewall solution
16
![Page 20: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/20.jpg)
References: 1. Discovering Computer
Fundamentals:2014 (writter:Shelly)
2. https://en.wikipedia.org/wiki/Spoofing_attack
3. http://files- recovery.blogspot.com/2010/06/20-common-types-of-computer-viruses-and.html 17
![Page 21: Computer securety](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a8c2be1a28ab53138b4cd9/html5/thumbnails/21.jpg)