Documente Academic
Documente Profesional
Documente Cultură
•Networks
•Computers
•Programs
•Data from attack
•Damage
•Unauthorized access
Jatins
1
RISKS OF COMPUTER SECURITY
•Loss or damage to computer hardware
•Software
•Data
• Information
Some breaches to computer security are accidental, but
some are planned. Any illegal act involving a computer is
generally referred to as a computer crime.
Jatins
2
SECURITY SYSTEM
Jatins
3
CYBER TECHNOLOGY
Field of technology that deals with the development of:
•Artificial devices
•Machines
•Techniques
•Intelligence
•Components
Jatins
4
Jatins
5
COMPUTER PROTECTION
Virus protection software is designed to prevent
viruses, worms and Trojan horses from getting onto a
computer as well as remove any malicious software
code that has already infected computer.
Jatins
6
Governments, military, corporations, financial institutions, hospitals
and other businesses collect, process and store a great deal of
confidential information on computers and transmit that data
across networks to other computers. With the growing volume and
sophistication of cyber attacks, ongoing attention is required to
protect sensitive business and personal information, as well as
safeguard national security.
Jatins
7
AREAS OF CYBER SECURITY
Data in a database or on the file system
Application Security or a system resource
Jatins
8
Identify Threats
Cyber Securities
Weakness
Exploitation of Weakness
Protections on Weakness
Jatins
9
SECURE COMPUTER FROM ONLINE
THREATS WHILE SURFING INTERNET
Jatins
10
Jatins
11
COMPUTER SECURITY - THREATS
• Intrusions
– Any attempt to gain unauthorized access to a system
– Cracking
– Hacking
– Social Engineering
– War-driving
WHAT IS CYBERCRIME?
• Using the Internet to commit a crime.
– Identity Theft
– Hacking
– Virus
• Facilitation of traditional criminal activity
– Stalking
– Stealing information
– Child Pornography
CYBERCRIME COMPONENTS
• Computers
• Cell Phones
• PDA’s
• Game Consoles
COMPUTER SECURITY - TERMINOLOGY
• Script Kiddies
– Someone that calls themselves a ‘hacker’ but really
isn’t
• Ethical Hacker
– Someone hired to hack a system to find vulnerabilities
and report on them.
– Also called a ‘sneaker’
Jatins
16
Allow a program or feature through window Firewall
Setting for each type of Network
Jatins
18
Jatins
19
Jatins
20
Jatins
21
Jatins
22
Jatins
23
Jatins
24
Jatins
25
Jatins
26