SlideShare a Scribd company logo
A Quick Look at Computer Security Ahmed D. Mekkawy AKA linuxawy [email_address]
Computer Security Network Security.
Host Security.
Physical Security.
… etc
Encryption & Hashing Single Key encryption.
Public / Private key encryption.
Hashing: a true one way function?
Md5? Md6 is in the kitchen now.
Sha1, sha256, sha512, sha1024
Tunneling.
Ssl (ssh, https, … etc)
Data Hiding ?!
First Things First Mentality: always challenge your work. Wear the offending attackers' hat, and think how to destroy what you have done.
Never Underestimate your potential opponent.
Never underestimate how your data/computer is important to others (may be more than how it's important to you).
Password is like a toothbrush, never share it.
Use Good Passwords Password less than 8 characters is lame.
Password containing only lower case characters is lamer.
Passwords containing your birth date/phone number is more lamer.
Passwords containing a sequense of digits like 123456 is the lamest.
Single password used among everything is a DISASTER.

More Related Content

PPT
Snooze, you Lose!
 
PPTX
Computer security privacy and ethics
PPT
1556 a 10
PPTX
Computer , Internet and physical security.
PPTX
Ethics and privacy ppt 3rd period
PPTX
Chapter 11 computer security and safety, ethics, and privacy
PPT
Lesson 8 - Understanding Backup and Recovery Methods
PPTX
Computer security threats & prevention
Snooze, you Lose!
 
Computer security privacy and ethics
1556 a 10
Computer , Internet and physical security.
Ethics and privacy ppt 3rd period
Chapter 11 computer security and safety, ethics, and privacy
Lesson 8 - Understanding Backup and Recovery Methods
Computer security threats & prevention

Viewers also liked (11)

PPTX
InformationSecurity
PPTX
Computer Security 101
PPTX
Privacy , Security and Ethics Presentation
PPT
Introduction to Information Security
PPT
Computer Ethics Presentation
PPT
Introduction To Information Security
PDF
Computer Security
PPTX
Information Security Lecture #1 ppt
PPT
Cybercrime presentation
PPTX
INFORMATION SECURITY
PPTX
Cyber crime and security ppt
InformationSecurity
Computer Security 101
Privacy , Security and Ethics Presentation
Introduction to Information Security
Computer Ethics Presentation
Introduction To Information Security
Computer Security
Information Security Lecture #1 ppt
Cybercrime presentation
INFORMATION SECURITY
Cyber crime and security ppt
Ad

Similar to A look at computer security (20)

PDF
Packet Filtering Using Iptables
PPT
Unified Threat Management
PDF
Manage Network Security (Firewall) in RHEL - RHCSA (RH134).pdf
ODP
Firewalld : A New Interface to Your Netfilter Stack
PPTX
How to convert your Linux box into Security Gateway - Part 1
PPTX
Stupid iptables tricks
PDF
Linux firewall
PPTX
Ip tables
PPTX
Linux – routing and firewall for beginners v 1.0
PDF
Iptablesrocks
DOCX
Creating a firewall in UBUNTU
PPTX
types of firewalls ppt computer networks
PPTX
Firewall ppt
PPTX
501 ch 3 network technologies tools
PPT
Unix Web servers and FireWall
PPT
Unix Web servers and FireWall
PPTX
PPTX
Linux routing and firewall for beginners
PDF
Firewall Facts
PPT
Myles firewalls
Packet Filtering Using Iptables
Unified Threat Management
Manage Network Security (Firewall) in RHEL - RHCSA (RH134).pdf
Firewalld : A New Interface to Your Netfilter Stack
How to convert your Linux box into Security Gateway - Part 1
Stupid iptables tricks
Linux firewall
Ip tables
Linux – routing and firewall for beginners v 1.0
Iptablesrocks
Creating a firewall in UBUNTU
types of firewalls ppt computer networks
Firewall ppt
501 ch 3 network technologies tools
Unix Web servers and FireWall
Unix Web servers and FireWall
Linux routing and firewall for beginners
Firewall Facts
Myles firewalls
Ad

More from Ahmed Mekkawy (20)

PDF
Encrypted Traffic in Egypt - an attempt to understand
ODP
Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...
PDF
OpenData for governments
ODP
Infrastructure as a Code
PDF
شركة سبيرولا للأنظمة والجمعية المصرية للمصادر المفتوحة
PDF
Everything is a Game
ODP
Why Cloud Computing has to go the FOSS way
ODP
FOSS Enterpreneurship
ODP
Intro to FOSS & using it in development
PDF
FOSS, history and philosophy
ODP
Virtualization Techniques & Cloud Compting
ODP
Networking in Gnu/Linux
ODP
Foss Movement In Egypt
ODP
Sysprog17
ODP
Sysprog 15
ODP
Sysprog 9
ODP
Sysprog 12
ODP
Sysprog 14
ODP
Sysprog 11
ODP
Sysprog 7
Encrypted Traffic in Egypt - an attempt to understand
Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...
OpenData for governments
Infrastructure as a Code
شركة سبيرولا للأنظمة والجمعية المصرية للمصادر المفتوحة
Everything is a Game
Why Cloud Computing has to go the FOSS way
FOSS Enterpreneurship
Intro to FOSS & using it in development
FOSS, history and philosophy
Virtualization Techniques & Cloud Compting
Networking in Gnu/Linux
Foss Movement In Egypt
Sysprog17
Sysprog 15
Sysprog 9
Sysprog 12
Sysprog 14
Sysprog 11
Sysprog 7

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Machine learning based COVID-19 study performance prediction
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Approach and Philosophy of On baking technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Machine learning based COVID-19 study performance prediction
Building Integrated photovoltaic BIPV_UPV.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
MIND Revenue Release Quarter 2 2025 Press Release
Approach and Philosophy of On baking technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

A look at computer security