khairulmizam@upm.edu.my
ECC4703: Computer Security
Khairulmizam Samsudin, Ph.D.
khairulmizam@upm.edu.my
ECC4703: Computer Security
Plain and Simple
Khairulmizam Samsudin, Ph.D.
khairulmizam@upm.edu.my
Presentation Contents
1. Awareness test for audience
2. Scenario related to security incident
3. Definition of computer related term
4. What to do in the event of attack
5. Statistics on computer crime
6. News related to computer security
7. Laws and regulation related to computer
usage
3
khairulmizam@upm.edu.my
Learning outcome
At the end of this talk, audience will
1. be aware of computer security risk at
home and in the workplace
2. be able to identify common computer
security issues
3. follow best computer security practice
4. have the knowledge to handle computer
security incident
4
khairulmizam@upm.edu.my
Computer attack
5
khairulmizam@upm.edu.my 6
khairulmizam@upm.edu.my
Scenario #1
Reference:https://goo.gl/2FWWAf 7
From: UPM Email Administrator [mailto:admin@email.upm.edu.my]
Sent: 12 May 2016 8:51am
To: khairulmizam@upm.edu.my
Subject: Email Storage Warning
Dear Dr. Khairulmizam Samsudin,
Your mailbox is almost full.
Please reduce your mailbox size by email deletion. Click here to reduce
size automatically
khairulmizam@upm.edu.my
Scenario #1 (Cont…)
8
khairulmizam@upm.edu.my
Scenario #1 (Cont…)
9
khairulmizam@upm.edu.my
Scenario #1 (Cont…)
10
khairulmizam@upm.edu.my 11
Scenario #1: Phising Attack
Definition: attempt to
acquire sensitive
information by masquerading
as a trustworthy entity in
electronic communication.
Variation: bank account,
monetary reward, over
credit, using other
communication medium, etc
Reference:https://goo.gl/lygRnT
khairulmizam@upm.edu.my
Scenario #1
12
khairulmizam@upm.edu.my
Scenario #1
13
khairulmizam@upm.edu.my
Scenario #1: To do
14
To Do
● Verify the URL address
● Use HTTPS (if available)
● Enable anti-virus
‘secure browsing’
feature
● Update OS and anti-virus
regularly
khairulmizam@upm.edu.my
The Internet of Things
Reference:http://device.is/1dwxcL1 15
khairulmizam@upm.edu.my 16
News
khairulmizam@upm.edu.my 17
Computer Network Architecture
khairulmizam@upm.edu.my
99%
18
of all computer security
incidents involve human
error - “IBM”
Reference:http://goo.gl/2cIkZc
khairulmizam@upm.edu.my 19
khairulmizam@upm.edu.my
This talk is not about...
How to…
● e-Punch from outside UPM?
● How to crack application or games?
● How to obtain password of protected WiFi?
● How to top-up SmartTAG for free?
● How to <illegal activity> ?
20
khairulmizam@upm.edu.my 21Reference:http://goo.gl/c5leyU
The usual suspect
khairulmizam@upm.edu.my 22Reference:http://goo.gl/8I6lbm
The unusual suspect
khairulmizam@upm.edu.my
Motivation
23Reference:http://goo.gl/ILfLkr
khairulmizam@upm.edu.my 24
khairulmizam@upm.edu.my
Oversharing
Reference:https://goo.gl/hyuCTD 25
khairulmizam@upm.edu.my
RM 1.6billion
26
Losses from cybercrime in
2012 - “PDRM”
khairulmizam@upm.edu.my 27
Method
khairulmizam@upm.edu.my 28
khairulmizam@upm.edu.my
Law and Regulation
1. Akta Jenayah Komputer 1997 (Akta 563)
2. Akta Komunikasi dan Multimedia 1998 (Akta
588)
3. Akta Harta Intelek (Paten dan Hakcipta)
4. Arahan Teknologi Maklumat 2007 (Akta 680)
5. Akta Perlindungan Data Peribadi 2010 (Akta
709)
6. Kaedah-Kaedah Universiti Putra Malaysia
(Teknologi Maklumat Dan Komunikasi) 2013
7. Garis Panduan Keselamatan Teknologi
Maklumat dan Komunikasi (GPKTMK), UPM 2014
29
khairulmizam@upm.edu.my 30
khairulmizam@upm.edu.my 31
khairulmizam@upm.edu.my 32
khairulmizam@upm.edu.my
Awareness Test #1: Computer/Smartphone
1. I know how to install and uninstall software
2. I pay my utility bill online
3. I know how to configure WiFi
4. I know how to hook up all the computer cables
5. I can format and reinstall OS on my computer
33
khairulmizam@upm.edu.my
Scenario #2
34
khairulmizam@upm.edu.my
Scenario #2
35
khairulmizam@upm.edu.my
Scenario #2 (Cont…)
36
khairulmizam@upm.edu.my 37
Scenario #2: Hoax, Chain letter, Faxlore, etc
Definition: a message that
attempts to convince the
recipient to distribute copies
of the letter and then pass
them on to as many recipients
as possible.
Variation: children in need,
petitions, false warnings,
monetary rewards, urban
legends, superstitions
khairulmizam@upm.edu.my
Scenario #2: Law and Regulation
38
Akta Komunikasi dan Multimedia 1998 (Akta 588)
khairulmizam@upm.edu.my
Scenario #2: Law and Regulation
39
Akta Komunikasi dan Multimedia 1998 (Akta 588)
khairulmizam@upm.edu.my
Scenario #2: To do
40
khairulmizam@upm.edu.my 41
khairulmizam@upm.edu.my
Scenario #2: News Y2K Bug
42
khairulmizam@upm.edu.my
Scenario #2: News Y2K Bug
43
khairulmizam@upm.edu.my
Scenario #2: News Y2K Bug
44
khairulmizam@upm.edu.my
Scenario #2: News
45
khairulmizam@upm.edu.my
Scenario #2: Law and Regulation
46
Garis Panduan Keselamatan Teknologi Maklumat dan
Komunikasi (GPKTMK), UPM 2014
khairulmizam@upm.edu.my
Scenario #2: News Putin lying?
47
khairulmizam@upm.edu.my
Awareness Test #2: Security
1. I know how to scan for virus/malware
2. I password protect my computer/smartphone
3. I have 8 character password with 1 capital
letter, 1 symbol and 1 number
4. I update my computer OS and software frequently
5. I use a non-administrator user account on my
computer
48
khairulmizam@upm.edu.my 49Reference:http://goo.gl/2JBIrc
khairulmizam@upm.edu.my
Scenario #3
Reference:https://goo.gl/2FWWAf 50
khairulmizam@upm.edu.my
Scenario #3: or worst
Reference:https://goo.gl/2FWWAf 51
khairulmizam@upm.edu.my
Scenario #3 (Cont…)
52
khairulmizam@upm.edu.my
Scenario #3: Law and Regulation (Cont…)
53
Garis Panduan Keselamatan Teknologi Maklumat dan
Komunikasi (GPKTMK), UPM 2014
khairulmizam@upm.edu.my
Scenario #3: To do
54
To Do
● Do not use the same password
● Do not share password and be
sure no one watches
● Use ‘incognito’ mode if you
are using public computer
● Lock or log off everytime
● Use biometric password (if
possible)
● Update OS and anti-virus
regularly
khairulmizam@upm.edu.my 55
khairulmizam@upm.edu.my
A computer
56Reference:http://goo.gl/iebAjE
khairulmizam@upm.edu.my 57
Awareness Test #3: What is a computer?
khairulmizam@upm.edu.my 58
Awareness Test #2: What is a computer?
khairulmizam@upm.edu.my 59
News
khairulmizam@upm.edu.my 60
News: Car hacking
… two researchers managed to take
control of an unaltered vehicle’s
electronically controlled subsystems
(radio, AC, wipers, transmission,
steering, even brakes) from afar,
using the Internet connection its
entertainment system makes through
Sprint’s cellular network … - “IEEE
Spectrum”
khairulmizam@upm.edu.my
What is Computer Security?
61Reference:http://goo.gl/uoFnoo
khairulmizam@upm.edu.my
News: Worst case scenario
62
khairulmizam@upm.edu.my 63
Definition: Computer Security in UPM
Garis Panduan Keselamatan Teknologi Maklumat dan
Komunikasi (GPKTMK), UPM 2014
khairulmizam@upm.edu.my 64
Information
Definition: Computer Security in UPM
Garis Panduan Keselamatan Teknologi Maklumat dan
Komunikasi (GPKTMK), UPM 2014
khairulmizam@upm.edu.my 65
khairulmizam@upm.edu.my 66
khairulmizam@upm.edu.my
Scenario #4
Reference:https://goo.gl/2FWWAf 67
Ring ring ring...
Caller: Hi Jenny, this is Smith from
Accounting Department. Can you
email me the latest quaterly
report?
Jenny: Ok...
khairulmizam@upm.edu.my
Scenario #4
68
Ring ring ring...
Caller: Hi Jenny, this is Smith from
Accounting Department. Can you
email me the latest quaterly
report?
Jenny: Ok...
khairulmizam@upm.edu.my 69
Scenario #2: Social Engineering
Definition: an attack
that relies heavily on
human interaction and
involves tricking people
into breaking security
procedures.
Variation: call from IT,
reset password, install
a software, click a
link, etc
khairulmizam@upm.edu.my
Scenario #4: Law and Regulation
70
Garis Panduan Keselamatan Teknologi Maklumat dan
Komunikasi (GPKTMK), UPM 2014
khairulmizam@upm.edu.my
Scenario #4: To do
71
● Slow down
● Research the facts
● Never provide confidential
information to unknown
source (i.e. email)
● Beware of any downloads
and links
● Update OS and anti-virus
regularly
khairulmizam@upm.edu.my 72
News: Looking for a job?
khairulmizam@upm.edu.my
What to do if you are a victim?
73
1. Disconnect from network
2. Inform online account
provider
3. Report to authority
4. Get help
khairulmizam@upm.edu.my 74
99%
of Malaysian use
Facebook while on
the throne
Reference:http://goo.gl/q20oWc
khairulmizam@upm.edu.my
Scenario #5
75
khairulmizam@upm.edu.my
Scenario #5: Man-in-the-middle attack
76
Definition: an
attacker secretly
relays and alters
the communication
between two parties
who believe they are
directly
communicating with
each other..
Reference:http://goo.gl/22mq8V
khairulmizam@upm.edu.my
Scenario #5
77
khairulmizam@upm.edu.my
Scenario #5: To do & Not to do
78
To Do
● Avoid using public Wi-Fi
(if possible)
● Avoid entering passwords
when using public Wi-Fi
connections
● Use HTTPS or VPN if you
need to enter passwords
khairulmizam@upm.edu.my 79
khairulmizam@upm.edu.my
Additional tips
80
● Only download from trusted
sources
● Only install trusted
software
● Use a decent web browser
khairulmizam@upm.edu.my 81

More Related Content

PPTX
Computer Technology
PPTX
MediaMosa and webservices
PPTX
Viruses and internet security
PPT
Viruses (Lecture) IT Slides # 3
PPT
Isys20261 lecture 02
PPTX
Virus-Awareness
PPT
Consumer electronics seminar
PPTX
Computer virus
Computer Technology
MediaMosa and webservices
Viruses and internet security
Viruses (Lecture) IT Slides # 3
Isys20261 lecture 02
Virus-Awareness
Consumer electronics seminar
Computer virus

Similar to Computer security 101 (20)

PPTX
Awareness Security 123.pptx
PPTX
USG_Security_Awareness_Primer (1).pptx
PPTX
USG_Security_Awareness_Primer.pptx
PPTX
USG_Security_Awareness_Primer.pptx
PPTX
Cyber Security Awareness Program.pptx
PDF
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
PPT
IT Security Awareness-v1.7.ppt
PPTX
System Security
PPTX
Security human
PPTX
ETHICS09 - Case Study - The Cuckoo's Egg
PPTX
Cyber Security
PDF
Retiring Offr Seminar Psn - ACG.pdf
PPTX
CybSecurity Awareness Storyboard Edit.pptx
PDF
Security awareness-checklist 2019
PDF
Secure Use of IT
PPTX
Cyber security government ppt By Vishwadeep Badgujar
PPTX
User security awareness
PDF
Creating Secure Social Applications
PDF
Refugees on Rails Berlin - #2 Tech Talk on Security
PPTX
mobile security.pptx
Awareness Security 123.pptx
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
Cyber Security Awareness Program.pptx
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
IT Security Awareness-v1.7.ppt
System Security
Security human
ETHICS09 - Case Study - The Cuckoo's Egg
Cyber Security
Retiring Offr Seminar Psn - ACG.pdf
CybSecurity Awareness Storyboard Edit.pptx
Security awareness-checklist 2019
Secure Use of IT
Cyber security government ppt By Vishwadeep Badgujar
User security awareness
Creating Secure Social Applications
Refugees on Rails Berlin - #2 Tech Talk on Security
mobile security.pptx
Ad

Recently uploaded (20)

PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
Configure Apache Mutual Authentication
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPT
What is a Computer? Input Devices /output devices
PDF
STKI Israel Market Study 2025 version august
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
UiPath Agentic Automation session 1: RPA to Agents
DOCX
search engine optimization ppt fir known well about this
PDF
Architecture types and enterprise applications.pdf
Developing a website for English-speaking practice to English as a foreign la...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Configure Apache Mutual Authentication
Taming the Chaos: How to Turn Unstructured Data into Decisions
sbt 2.0: go big (Scala Days 2025 edition)
Convolutional neural network based encoder-decoder for efficient real-time ob...
A proposed approach for plagiarism detection in Myanmar Unicode text
The influence of sentiment analysis in enhancing early warning system model f...
A contest of sentiment analysis: k-nearest neighbor versus neural network
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Custom Battery Pack Design Considerations for Performance and Safety
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Consumable AI The What, Why & How for Small Teams.pdf
What is a Computer? Input Devices /output devices
STKI Israel Market Study 2025 version august
Getting started with AI Agents and Multi-Agent Systems
2018-HIPAA-Renewal-Training for executives
UiPath Agentic Automation session 1: RPA to Agents
search engine optimization ppt fir known well about this
Architecture types and enterprise applications.pdf
Ad

Computer security 101