SlideShare a Scribd company logo
22nd – October, 2017.
APPLICATION OF SECURITY TO COMPUTER
Outline
• Introduction
• Definition of Computer Security
• Core Goal/Principle of Computer Security
• Vulnerability
• Threats
• Attacks
• Defenses
Introduction
• Many aspects of our lives rely on the
• Internet and computers,
 Communications include (email, cell phones, texting)
 Government licensing, tax records),
 Finance (bank accounts, loans, electronic paychecks),
 Medicine (equipment, medical records).
How much of personal information stored either on your own
computer or on someone else’s system.
• How is that data and the systems on which that data resides kept
secure?
• Thousands of infected web pages are being discovered every day.
Hundreds of millions of records have been involved in data breaches.
• New attack methods are launched continuously.
• Hackers have the ability to watch all your actions on the computer, or
cause damage to your computer by reformatting your hard drive or
changing your data.
CONT,
Computer security, also known as
-Cyber security
-IT security,
• Is the protection of computer systems from
-The theft
-Damage of either
-Hardware
-software
-Information,
-Disruption
-Misdirection of the services they provide.
CONT
Cyber security includes controlling physical
access to the hardware,
• Protecting against harm that may come via
network access, data and code injection.
• Most computer security measures involve
data;
• Encryption and Passwords.
Goals/Principle of Computer Security
CONT,
Confidentiality called Secrecy or Privacy:
ensures that computer-related assets are
accessed only by authorized parties.
• Integrity: it means that assets can be modified
only by authorized parties or only in authorized
ways.
•Availability: it means that assets are accessible
to authorized parties at appropriate times.
Vulnerability
• Vulnerability is a weakness in computer
security system. The types of vulnerabilities
we might find as
• Hardware,
• Software,
• Data.
Cont.,
• An interception means that some
unauthorized party has gained access to an
asset.
• In an interruption is an asset of the system
becomes lost, unavailable, or unusable.
• Modification If an unauthorized party not only
accesses but tampers with an asset
• Fabrication an unauthorized party might
create changes computing system.
Threats
• A threat is a circumstances that has the
potential to cause loss or harm. There are
many threats to a computer system, including
• Human-initiated
• Computer initiated ones.
• Computer crime,
• Vulnerability,
• Trojans & Viruses and worms
Attacks
• Backdoor; secret method of bypassing normal
authentication or security controls
• Denial-of-service attack; deliberately entering a
wrong password enough consecutive times to
cause the victim account to be locked
• Direct-access attacks; gaining physical access to a
computer is most likely able to directly copy data
from it
• Tampering; describes a malicious modification of
products.
Defenses
• Computer access control
• Application security
• Antivirus software
• Secure coding
• Secure operating systems
• Data-centric security
• Firewall (computing)
• Intrusion detection system
• Intrusion prevention system
• Mobile secure gateway
THANK YOU

More Related Content

PPTX
Types of cyber attacks
PPTX
Types of internet connections
PPTX
Computer Security Presentation
PPT
Information Security
PPT
Knowledge management ppt
PPTX
Web Application Security 101
PPTX
cyber security
PPTX
Cyber security
Types of cyber attacks
Types of internet connections
Computer Security Presentation
Information Security
Knowledge management ppt
Web Application Security 101
cyber security
Cyber security

Similar to Application of security computer (20)

PDF
20210629_104540Information Security L1.pdf
PPT
Information security introduction
PPTX
Information Security Bachelor in Information technology unit 1
PPT
Basic Security Chapter 1
PPT
Basic security concepts_chapter_1
PPTX
Security and management
PPTX
Network Security Basics in networking to learn
PPTX
Basic concepts in computer security
PPT
Security - Chapter 1.ppt
PPTX
security system by desu star chapter 1.pptx
PDF
Basic security concepts_chapter_1_6perpage
DOCX
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
PPT
Computer security overview
 
PDF
information security introduction for campus students.pdf
PPTX
Lecture 6 Cybersecurity-Basics and .pptx
PPT
Security practivce and their best way to lear
PPTX
PPT0-Computer Security Concepts.pptx
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
PDF
IA 124 Lecture 01 2022 -23-1.pdf hahahah
PPTX
Chapter 1 compu secur.pptx of security service
20210629_104540Information Security L1.pdf
Information security introduction
Information Security Bachelor in Information technology unit 1
Basic Security Chapter 1
Basic security concepts_chapter_1
Security and management
Network Security Basics in networking to learn
Basic concepts in computer security
Security - Chapter 1.ppt
security system by desu star chapter 1.pptx
Basic security concepts_chapter_1_6perpage
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Computer security overview
 
information security introduction for campus students.pdf
Lecture 6 Cybersecurity-Basics and .pptx
Security practivce and their best way to lear
PPT0-Computer Security Concepts.pptx
Computer Securityyyyyyyy - Chapter 1.ppt
IA 124 Lecture 01 2022 -23-1.pdf hahahah
Chapter 1 compu secur.pptx of security service
Ad

More from ibrahimzubairu2003 (12)

PPTX
Economic contribution of tourism in Nigeria
PPTX
Red cross and Red Crescent
PPTX
Gateway community resident perceptions of tourism development: Incorporating ...
PPTX
Gateway community resident perceptions of tourism development: Incorporating ...
PPT
Influence analysis of community resident support for sustainable tourism devel...
PPTX
ICRC, IFRC & National societies
PPT
Value adding service delivery for health care organization
PPT
Strategic management for health care organization
PPTX
stakeholders strategy on marketing
PPTX
Marketing strategy
PPTX
IKEA SWOT ANALYSIS
PPTX
SWOT ANALYSIS FOR IKEA
Economic contribution of tourism in Nigeria
Red cross and Red Crescent
Gateway community resident perceptions of tourism development: Incorporating ...
Gateway community resident perceptions of tourism development: Incorporating ...
Influence analysis of community resident support for sustainable tourism devel...
ICRC, IFRC & National societies
Value adding service delivery for health care organization
Strategic management for health care organization
stakeholders strategy on marketing
Marketing strategy
IKEA SWOT ANALYSIS
SWOT ANALYSIS FOR IKEA
Ad

Recently uploaded (20)

PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
Essential Infomation Tech presentation.pptx
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
top salesforce developer skills in 2025.pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Digital Strategies for Manufacturing Companies
PDF
medical staffing services at VALiNTRY
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
How to Choose the Right IT Partner for Your Business in Malaysia
Essential Infomation Tech presentation.pptx
Softaken Excel to vCard Converter Software.pdf
CHAPTER 2 - PM Management and IT Context
2025 Textile ERP Trends: SAP, Odoo & Oracle
VVF-Customer-Presentation2025-Ver1.9.pptx
Design an Analysis of Algorithms I-SECS-1021-03
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Odoo Companies in India – Driving Business Transformation.pdf
top salesforce developer skills in 2025.pdf
Operating system designcfffgfgggggggvggggggggg
PTS Company Brochure 2025 (1).pdf.......
Odoo POS Development Services by CandidRoot Solutions
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Digital Strategies for Manufacturing Companies
medical staffing services at VALiNTRY
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...

Application of security computer

  • 1. 22nd – October, 2017. APPLICATION OF SECURITY TO COMPUTER
  • 2. Outline • Introduction • Definition of Computer Security • Core Goal/Principle of Computer Security • Vulnerability • Threats • Attacks • Defenses
  • 3. Introduction • Many aspects of our lives rely on the • Internet and computers,  Communications include (email, cell phones, texting)  Government licensing, tax records),  Finance (bank accounts, loans, electronic paychecks),  Medicine (equipment, medical records). How much of personal information stored either on your own computer or on someone else’s system. • How is that data and the systems on which that data resides kept secure? • Thousands of infected web pages are being discovered every day. Hundreds of millions of records have been involved in data breaches. • New attack methods are launched continuously. • Hackers have the ability to watch all your actions on the computer, or cause damage to your computer by reformatting your hard drive or changing your data.
  • 4. CONT, Computer security, also known as -Cyber security -IT security, • Is the protection of computer systems from -The theft -Damage of either -Hardware -software -Information, -Disruption -Misdirection of the services they provide.
  • 5. CONT Cyber security includes controlling physical access to the hardware, • Protecting against harm that may come via network access, data and code injection. • Most computer security measures involve data; • Encryption and Passwords.
  • 7. CONT, Confidentiality called Secrecy or Privacy: ensures that computer-related assets are accessed only by authorized parties. • Integrity: it means that assets can be modified only by authorized parties or only in authorized ways. •Availability: it means that assets are accessible to authorized parties at appropriate times.
  • 8. Vulnerability • Vulnerability is a weakness in computer security system. The types of vulnerabilities we might find as • Hardware, • Software, • Data.
  • 9. Cont., • An interception means that some unauthorized party has gained access to an asset. • In an interruption is an asset of the system becomes lost, unavailable, or unusable. • Modification If an unauthorized party not only accesses but tampers with an asset • Fabrication an unauthorized party might create changes computing system.
  • 10. Threats • A threat is a circumstances that has the potential to cause loss or harm. There are many threats to a computer system, including • Human-initiated • Computer initiated ones. • Computer crime, • Vulnerability, • Trojans & Viruses and worms
  • 11. Attacks • Backdoor; secret method of bypassing normal authentication or security controls • Denial-of-service attack; deliberately entering a wrong password enough consecutive times to cause the victim account to be locked • Direct-access attacks; gaining physical access to a computer is most likely able to directly copy data from it • Tampering; describes a malicious modification of products.
  • 12. Defenses • Computer access control • Application security • Antivirus software • Secure coding • Secure operating systems • Data-centric security • Firewall (computing) • Intrusion detection system • Intrusion prevention system • Mobile secure gateway