SlideShare a Scribd company logo
Computer securety
COMPUTER SECURITY & SAFETY
ETHICS & PRIVACY
Faculty Of Bachelor Of Business Administration
Group name: Firewall
Presented By:
Samia Nizame
ID NO:14152101343
Marjana Ahmed
ID NO: 14152101341
Presentation Outline
 Computer
Security Risk
 Computer Crime
 7basic categories
of cyber crime
 Computer Viruses
 Computer Worms
 Trojan Horses
 Rootkit
 Symptoms
 Safeguards
 DoS attack
 Back Doors
 Spoofing
 Firewalls
 References
Computer Security Risks
A computer security risk is any event or action that
could cause a loss of or damage to computer
hardware, software, data, information or
processing capability
1
ComputerCrime
 An intentional breach of computer security
often involves a deliberate act that is against
the law
 Any illegal act involving a computer generally
is referred to as a computer crime
2
7basic categories of cyber crime (1/2)
 Hacker groups: Usually work anonymously and create tools
for hacking.
 Cracker: Someone who accesses a computer or network
illegally but has the intent of destroying data, information
or other malicious action
 Script Kiddie:A wannabe hacker, Someone who wants to
be a hacker but lacks any serious technical expertise
 CyberTerrorist: Someone who uses the internet or network
to destroy or damage computers for political reasons
3
7basic categories of cyber crime (2/2)
 Corporate Spies: Some corporate spies have excellent
computer & networking skills & are hired to break into
specific computer & steal its proprietary data & information
 Unethical Employees:They break into their employers’
computers for a variety of reasons
 Cyber extortionist: Someone who uses e-mail as a vehicle
for extortion
4
Computer Viruses
 Is a small program that affects or infects, a computer
negatively by altering the way the computer works
without the users knowledge
 It can damage files & system software including the
operating system
 Viruses name: Macro Virus, Boot Virus, Network Virus,
FAT Virus, Logic Bombs
5
Computer Worms
It is a program that copies itself repeatedly, for
example in memory or on a network, using up
resources & possibly shutting down the
computer or network
6
Trojan Horses
 A trojan horse named
after the Greek myth is a
program that hides
within or looks like a
legitimate program
 A trojan horse does not
replicate itself to other
computers 7
Rootkit
It is a program that
hides in computer &
allows someone
from a remote
location to take full
control of the
computer
8
Once the rootkit its installed, the
rootkit author can execute
programs, change settings,
monitor activity, and access files
on the remote computer
Symptoms (1/2)
9
Symptoms (2/2)
10
Safeguards against computer viruses &
other Malware (1/2)
 Never start a computer with removable media inserted in
the drives of plugged in the ports, unless the media are
uninfected
 Never open an e-mail attachment unless you are expecting
it & is from a trusted source
 Set the macro security in program so that you can enable or
disable macros
 Install an antivirus program on all of your computers
11
 Scan all downloaded programs for viruses & other malware
 If the antivirus program flags an e-mail attachment as
infected, delete or quarantine the attachment immediately
Before using any removable media, scan the media for
malware
 Install a personal firewall program
 Stay informed about new virus alerts & virus hoaxes
Safeguards against computer viruses &
other Malware (2/2)
12
DoS attack
13
Back Doors
14
Spoofing
15
Firewalls
16
References:
1. Discovering Computer Fundamentals:2014
(writter:Shelly)
2. https://en.wikipedia.org/wiki/Spoofing_attack
3. http://files- recovery.blogspot.com/2010/06/20-
common-types-of-computer-viruses-and.html
17
Computer securety

More Related Content

PPTX
BackDoors Seminar
PPTX
Computer Security
PPT
Seven Effective Habits When Using The Internet
PPSX
Detection of running backdoors
PPT
Keyloggers and Spywares
PPT
Backdoor
PPTX
Security threats and safety measures
PPTX
Dickmaster
BackDoors Seminar
Computer Security
Seven Effective Habits When Using The Internet
Detection of running backdoors
Keyloggers and Spywares
Backdoor
Security threats and safety measures
Dickmaster

What's hot (20)

PPTX
Impact of ict on siocety virus
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
PPTX
Protection from hacking attacks
PPTX
Types of malware threats
PPTX
Basics of Network Security
PPT
Computer Virus
PPT
Computer security overview
 
PPTX
Trojans and backdoors
PPTX
5 Network Security Threats Facing Businesses Today
PPTX
Computer security
PPTX
Common malware and countermeasures
PPT
Spywares & Keyloggers
PPTX
Malware and Anti-Malware Seminar by Benny Czarny
PDF
What is Network Security?
PPTX
PPTX
Cyper security & Ethical hacking
PPTX
Ethical hacking
PPTX
Web defacement
DOCX
CLASS VII COMPUTER SECURITY
PPTX
Cybersecurity Essentials - Part 1
Impact of ict on siocety virus
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Protection from hacking attacks
Types of malware threats
Basics of Network Security
Computer Virus
Computer security overview
 
Trojans and backdoors
5 Network Security Threats Facing Businesses Today
Computer security
Common malware and countermeasures
Spywares & Keyloggers
Malware and Anti-Malware Seminar by Benny Czarny
What is Network Security?
Cyper security & Ethical hacking
Ethical hacking
Web defacement
CLASS VII COMPUTER SECURITY
Cybersecurity Essentials - Part 1
Ad

Similar to Computer securety (20)

PPT
computer security
PPTX
Week_7.pptx Computer science topic 7 Notes
PPTX
chp .4.Ethics and Safety in computing
PPTX
Computer security ethics_and_privacy
PPTX
BAIT1003 Chapter 11
PPTX
Network security and viruses
PPT
Computer security
PPT
Computer security and_privacy_2010-2011
PDF
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
PPTX
BCE L-3omputer security Basics.pptx
PDF
Computer crimes
DOC
Chapter 2- Computer Threat.docChapter 2- Computer Threat.doc
PDF
2.Security (1).pdfccccccccccccccccccccccccccccccccccccccccccccc
PPTX
Security & Privacy - Lecture B
PPT
Computer Securityyyyyyyy - Chapter 2.ppt
PDF
Notacd02
PPTX
23 network security threats pkg
PPT
computer_security.ppt
PPTX
4.2.1 computer security risks
PDF
Chapter 4 Computer Science :: Computer Ethics and Security
computer security
Week_7.pptx Computer science topic 7 Notes
chp .4.Ethics and Safety in computing
Computer security ethics_and_privacy
BAIT1003 Chapter 11
Network security and viruses
Computer security
Computer security and_privacy_2010-2011
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
BCE L-3omputer security Basics.pptx
Computer crimes
Chapter 2- Computer Threat.docChapter 2- Computer Threat.doc
2.Security (1).pdfccccccccccccccccccccccccccccccccccccccccccccc
Security & Privacy - Lecture B
Computer Securityyyyyyyy - Chapter 2.ppt
Notacd02
23 network security threats pkg
computer_security.ppt
4.2.1 computer security risks
Chapter 4 Computer Science :: Computer Ethics and Security
Ad

Recently uploaded (20)

PPTX
web development for engineering and engineering
PPT
Project quality management in manufacturing
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Well-logging-methods_new................
PPTX
Sustainable Sites - Green Building Construction
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Welding lecture in detail for understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Digital Logic Computer Design lecture notes
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
web development for engineering and engineering
Project quality management in manufacturing
UNIT 4 Total Quality Management .pptx
Well-logging-methods_new................
Sustainable Sites - Green Building Construction
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
additive manufacturing of ss316l using mig welding
Welding lecture in detail for understanding
Operating System & Kernel Study Guide-1 - converted.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
R24 SURVEYING LAB MANUAL for civil enggi
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Digital Logic Computer Design lecture notes
Embodied AI: Ushering in the Next Era of Intelligent Systems
Internet of Things (IOT) - A guide to understanding
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Lecture Notes Electrical Wiring System Components
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx

Computer securety

  • 2. COMPUTER SECURITY & SAFETY ETHICS & PRIVACY Faculty Of Bachelor Of Business Administration Group name: Firewall Presented By: Samia Nizame ID NO:14152101343 Marjana Ahmed ID NO: 14152101341
  • 3. Presentation Outline  Computer Security Risk  Computer Crime  7basic categories of cyber crime  Computer Viruses  Computer Worms  Trojan Horses  Rootkit  Symptoms  Safeguards  DoS attack  Back Doors  Spoofing  Firewalls  References
  • 4. Computer Security Risks A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability 1
  • 5. ComputerCrime  An intentional breach of computer security often involves a deliberate act that is against the law  Any illegal act involving a computer generally is referred to as a computer crime 2
  • 6. 7basic categories of cyber crime (1/2)  Hacker groups: Usually work anonymously and create tools for hacking.  Cracker: Someone who accesses a computer or network illegally but has the intent of destroying data, information or other malicious action  Script Kiddie:A wannabe hacker, Someone who wants to be a hacker but lacks any serious technical expertise  CyberTerrorist: Someone who uses the internet or network to destroy or damage computers for political reasons 3
  • 7. 7basic categories of cyber crime (2/2)  Corporate Spies: Some corporate spies have excellent computer & networking skills & are hired to break into specific computer & steal its proprietary data & information  Unethical Employees:They break into their employers’ computers for a variety of reasons  Cyber extortionist: Someone who uses e-mail as a vehicle for extortion 4
  • 8. Computer Viruses  Is a small program that affects or infects, a computer negatively by altering the way the computer works without the users knowledge  It can damage files & system software including the operating system  Viruses name: Macro Virus, Boot Virus, Network Virus, FAT Virus, Logic Bombs 5
  • 9. Computer Worms It is a program that copies itself repeatedly, for example in memory or on a network, using up resources & possibly shutting down the computer or network 6
  • 10. Trojan Horses  A trojan horse named after the Greek myth is a program that hides within or looks like a legitimate program  A trojan horse does not replicate itself to other computers 7
  • 11. Rootkit It is a program that hides in computer & allows someone from a remote location to take full control of the computer 8 Once the rootkit its installed, the rootkit author can execute programs, change settings, monitor activity, and access files on the remote computer
  • 14. Safeguards against computer viruses & other Malware (1/2)  Never start a computer with removable media inserted in the drives of plugged in the ports, unless the media are uninfected  Never open an e-mail attachment unless you are expecting it & is from a trusted source  Set the macro security in program so that you can enable or disable macros  Install an antivirus program on all of your computers 11
  • 15.  Scan all downloaded programs for viruses & other malware  If the antivirus program flags an e-mail attachment as infected, delete or quarantine the attachment immediately Before using any removable media, scan the media for malware  Install a personal firewall program  Stay informed about new virus alerts & virus hoaxes Safeguards against computer viruses & other Malware (2/2) 12
  • 20. References: 1. Discovering Computer Fundamentals:2014 (writter:Shelly) 2. https://en.wikipedia.org/wiki/Spoofing_attack 3. http://files- recovery.blogspot.com/2010/06/20- common-types-of-computer-viruses-and.html 17

Editor's Notes

  • #3: Group name: Trojan horse
  • #12: Once the rootkit its installed, the rootkit author can execute programs, change settings, monitor activity, and access files on the remote computer.
  • #15: Safeguards against computer viruses & other Malware (2/2)