SlideShare a Scribd company logo
Computer security
Introduction of CCoommppuutteerr SSeeccuurriittyy.......... 
 What is Computer Security? 
• Lock the doors and windows and you are secure 
NOT 
• Call the police when you feel insecure 
Really? 
• Computers are powerful, programmable machines 
Whoever programs them controls them (and 
not you) 
• Networks are ubiquitous 
Carries genuine as well as malicious traffic 
End result: Complete computer security is 
unattainable, it is a cat and mouse game; 
Similar to crime vs. law enforcement.
Definition WWhhiicchh II DDeeffiinneedd AAbboouutt 
CCoommppuutteerr SSeeccuurriittyy…… 
 Computer Security is the protection of 
computing systems and the data that User store 
or access. 
TThhee DDeeffiinniittiioonn FFrroomm WWiikkiippeeddiiaa 
Computer security is information security as 
applied to computing devices such as 
computers and smart phones, as well as 
computer networks such as private and public 
networks, including the Internet.
GGooaallss OOff CCoommppuutteerr sseeccuurriittyy…….. 
• Integrity: 
Guarantee that the data is what we expect. 
•Confidentiality: 
The information must just be accessible to the 
authorized people. 
•Reliability: 
Computers should work without having unexpected 
problems. 
•Authentication: 
Guarantee that only authorized persons can access 
to the resources.
BBaassiicc SSeeccuurriittyy……
WWhhyy iiss CCoommppuutteerr SSeeccuurriittyy 
IImmppoorrttaanntt??
aallssoo……..
SSeeccuurriittyy AAttttaacckkss 
AAttttaacckk oonn tthhee ccoommppuutteerr ssyysstteemm iittsseellff 
assword guessing 
hishing 
poofing 
ack door 
uffer overflow 
HHaavvee yyoouu eevveerr eexxppeerriieenncceedd oonnee ooff tthheessee??
PPaasssswwoorrdd GGuueessssiinngg 
 Obvious 
PPhhiisshhiinngg 
 Trick users into revealing security information 
SSppooooffiinngg 
 Malicious user masquerades as authorized user 
BBaacckk ddoooorr 
 A backdoor is a program placed by a black-hacker 
that allows him to access a system. A 
backdoor have many functionalities such as 
keyboard-sniffer, display spying, etc.
BBuuffffeerr oovveerrffllooww 
 Defect that could cause a system to crash and 
leave the user with heightened privileges 
DDeenniiaall ooff sseerrvviiccee 
 Attach that prevents authorized user from 
accessing the system 
MMaann iinn tthhee mmiiddddllee 
 Network communication is intercepted in an 
attempt to obtain key data
MMoorree AAttttaacckkss…… 
1. Packet Sniffing (Internet traffic consists of data “packets”, and 
these can be “sniffed”) 
2. Man in the Middle(Insert a router in the path between client and 
server, and change the packets as they pass through) 
3. DNS hijacking(Insert malicious routes into DNS tables to send 
traffic for genuine sites to malicious sites) 
4. Phishing(An evil website pretends to be a trusted website) 
Example: 
1. You type, by mistake, “mibank.com” instead of “mybank.com” 
mibank.com designs the site to look like mybank.com so the user types 
in their info as usual 
2. BAD! Now an evil person has your info!
VViirruuss 
Piece of code that automatically reproduces itself. 
It’s attached to other programs or files, but 
requires user intervention to propagate. 
Attacks on Computer For Virus 
i. Infect Executable files 
ii. Infect Boot sectors 
iii. Infect Documents (macros), scripts (web pages), etc. 
Source of Virus 
It can be create itself in computer system. It also 
create with storage elements, mails, downloaded 
files or shared folders.
WWoorrmm 
Piece of code that automatically reproduces itself over the 
network. It doesn’t need the user intervention to 
propagate (autonomous). 
Attacks on Computer For Worm 
It infects computer via buffer overflow, file sharing, 
configuration errors and other vulnerabilities. 
What It search? 
It search Email addresses, DNS, IP, network 
neighborhood for hacking or Malicious 
programs Backdoor, DDoS agent, etc.
SSoocciiaall EEnnggiinneeeerriinngg 
•Manipulating a person or persons into 
divulging confidential information. 
 Would us also have to aware about this? 
1. Yes, cause Social engineers are a lot more cunning 
than you. 
2. It also can Happen with Corporate Executive & 
Most of theme are fooled by this hackers.
HHeerree’’ss aa ssmmaallll EExxaammppllee ooff SSoocciiaall 
eennggiinneeeerr’’ss wwoorrkk....
HHooww ccaann wwee pprrootteecctt oouurr 
CCoommppuutteerrss & UUss ffrroomm tthhiiss 
kkiinndd ooff tthhrreeaattss.... 
For computer access 
1. User knowledge (Name, password, PIN) 
2. Smart card (A card with an embedded memory chip 
used for identification) 
3. Biometrics (Human characteristics such as fingerprints, 
retina or voice patterns)
GGuuiiddeelliinnee FFoorr PPaasssswwoorrdd........ 
1. Easy to remember, hard to guess 
2. Don’t use family or pet names 
3. Don’t make it accessible 
4. Use combination uppercase/lowercase letters, 
digits and special characters 
5. Don’t leave computer when logged in 
6. Don’t ever tell anyone 
7. Don’t include in an email 
8. Don’t use the same password in lots of places
OOnn IInntteerrnneett 
CAPTCHA 
Software that verifies that the user is not another 
computer 
You have to look at a weird set of 
characters and key them back in. 
Why does this work?
iinnggeerr pprriinntt aannaallyysseerr
Some Other Techniques of 
Securing Computer.... 
Ensuring computer and network security 
i. Cryptography 
ii. Secure networks 
iii. Antivirus software 
iv. Firewalls 
In addition, users have to practice “safe 
computing” 
1. Not downloading from unsafe websites 
2. Not opening attachments 
3. Not trusting what you see on websites 
4. Avoiding Scams
CCrryyppttooggrraapphhyy 
Secret Codes 
 Encryption 
o Converting data to unreadable codes to prevent anyone form 
accessing this information. 
o Need a “key” to find the original data – keys take a few 
million-trillion years to guess. 
 Public keys 
An ingenious system of proving you know your password without 
disclosing your password. Also used for digital signatures. 
o Used heavily in SSL connections. 
 Hashing 
o Creating fingerprints of documents.
Conclusion 
Its not that easy to protect yourself or your computer 
from threats & attacks. But its not that much harder 
either. So just follow some rules & you are protected 
from this threats & attacks. 
Computer security is for protect the user. So we will 
follow the rules to protect ourselves.
Computer security

More Related Content

PPTX
Ethical hacking
DOCX
Password hacking
PPT
internet security
PDF
[Computer] hacking for dummies how to learn to hack in easy steps
PPTX
Internet security
PPTX
Web defacement
PPTX
Introduction To Ethical Hacking
PPTX
Hacking
Ethical hacking
Password hacking
internet security
[Computer] hacking for dummies how to learn to hack in easy steps
Internet security
Web defacement
Introduction To Ethical Hacking
Hacking

What's hot (20)

PPTX
Learn awesome hacking tricks
PPTX
Black hat hackers
PPT
Ethical hacking
PPTX
Internet security
PPTX
Introduction to Ethical Hacking (Basics)
PPT
Hacking
PPT
Hacking version 2
PPTX
Security Threats
PPT
Basic Introduction to hacking
PPTX
Hacking Vs Cracking in Computer Networks
PPSX
Ethical Hacking
PPTX
Hacking
PPTX
Website attack n defacement n its control measures
PDF
Hackingppt 160730081605
PPTX
National information security education & awareness program
PPT
Hacking Kishor
PPSX
Web security
PPTX
Computer hacking
PDF
Internet security tutorial
PPTX
Ethical hacking
Learn awesome hacking tricks
Black hat hackers
Ethical hacking
Internet security
Introduction to Ethical Hacking (Basics)
Hacking
Hacking version 2
Security Threats
Basic Introduction to hacking
Hacking Vs Cracking in Computer Networks
Ethical Hacking
Hacking
Website attack n defacement n its control measures
Hackingppt 160730081605
National information security education & awareness program
Hacking Kishor
Web security
Computer hacking
Internet security tutorial
Ethical hacking
Ad

Viewers also liked (20)

PPTX
Application software
PPTX
Kimmy kangaroo
PDF
e-bulletin-November2010
PDF
The Health Benefits of Indian Food
PPSX
Shapes shapes-everywhere
PPTX
Lou lou moose
DOCX
Cognitive dissonance is a Good thing
PDF
Angely flores
PDF
為你而讀_國家記憶
PPTX
Hippy hippo
PPTX
Jenny jaguar
PPT
Team building
DOCX
Bet365 review
PPTX
Victor vampire
PPTX
Crazy camel
DOCX
Holland vs Argentina Predictions
PPTX
Daisy dragon
PPTX
法雅客攝影馬拉松記錄
PPTX
Farley fox
PDF
China air pollution season kicks off with a cough and a wheeze as coal plants...
Application software
Kimmy kangaroo
e-bulletin-November2010
The Health Benefits of Indian Food
Shapes shapes-everywhere
Lou lou moose
Cognitive dissonance is a Good thing
Angely flores
為你而讀_國家記憶
Hippy hippo
Jenny jaguar
Team building
Bet365 review
Victor vampire
Crazy camel
Holland vs Argentina Predictions
Daisy dragon
法雅客攝影馬拉松記錄
Farley fox
China air pollution season kicks off with a cough and a wheeze as coal plants...
Ad

Similar to Computer security (20)

DOCX
Chapter 10.0
PDF
The Basics of Protecting Against Computer Hacking
PPT
Introduction To Information Security
PDF
Ethical Hacking
PPT
basic knowhow hacking
PPT
Ethical Hacking
PPTX
Computer-Security.pptx
PPT
Ethical Hacking - Introduction to Computer Security
PPT
Ethical Hacking - Introduction to Computer Security
PPT
Introduction To Computer Security
PDF
Computer security
PPT
Dos and Dont to be followed to protect information and technology
PPT
Ch # 10 computer security risks and safe guards
DOCX
Hamza
DOCX
Cyber crime
PPT
New internet security
PPT
NewIinternet security
PPT
System-Security-acit-Institute
PPTX
Computer ethics
PPT
Hacking 1224807880385377-9
Chapter 10.0
The Basics of Protecting Against Computer Hacking
Introduction To Information Security
Ethical Hacking
basic knowhow hacking
Ethical Hacking
Computer-Security.pptx
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Introduction To Computer Security
Computer security
Dos and Dont to be followed to protect information and technology
Ch # 10 computer security risks and safe guards
Hamza
Cyber crime
New internet security
NewIinternet security
System-Security-acit-Institute
Computer ethics
Hacking 1224807880385377-9

More from Kawsar Ahmed (6)

PPTX
Computer virus
PPTX
System software is creating a modern world
PPT
Algorithm Design Presentation
PPTX
Flow chart
PPTX
mmmmmmm
PPTX
Computer Networking
Computer virus
System software is creating a modern world
Algorithm Design Presentation
Flow chart
mmmmmmm
Computer Networking

Computer security

  • 2. Introduction of CCoommppuutteerr SSeeccuurriittyy..........  What is Computer Security? • Lock the doors and windows and you are secure NOT • Call the police when you feel insecure Really? • Computers are powerful, programmable machines Whoever programs them controls them (and not you) • Networks are ubiquitous Carries genuine as well as malicious traffic End result: Complete computer security is unattainable, it is a cat and mouse game; Similar to crime vs. law enforcement.
  • 3. Definition WWhhiicchh II DDeeffiinneedd AAbboouutt CCoommppuutteerr SSeeccuurriittyy……  Computer Security is the protection of computing systems and the data that User store or access. TThhee DDeeffiinniittiioonn FFrroomm WWiikkiippeeddiiaa Computer security is information security as applied to computing devices such as computers and smart phones, as well as computer networks such as private and public networks, including the Internet.
  • 4. GGooaallss OOff CCoommppuutteerr sseeccuurriittyy…….. • Integrity: Guarantee that the data is what we expect. •Confidentiality: The information must just be accessible to the authorized people. •Reliability: Computers should work without having unexpected problems. •Authentication: Guarantee that only authorized persons can access to the resources.
  • 6. WWhhyy iiss CCoommppuutteerr SSeeccuurriittyy IImmppoorrttaanntt??
  • 8. SSeeccuurriittyy AAttttaacckkss AAttttaacckk oonn tthhee ccoommppuutteerr ssyysstteemm iittsseellff assword guessing hishing poofing ack door uffer overflow HHaavvee yyoouu eevveerr eexxppeerriieenncceedd oonnee ooff tthheessee??
  • 9. PPaasssswwoorrdd GGuueessssiinngg  Obvious PPhhiisshhiinngg  Trick users into revealing security information SSppooooffiinngg  Malicious user masquerades as authorized user BBaacckk ddoooorr  A backdoor is a program placed by a black-hacker that allows him to access a system. A backdoor have many functionalities such as keyboard-sniffer, display spying, etc.
  • 10. BBuuffffeerr oovveerrffllooww  Defect that could cause a system to crash and leave the user with heightened privileges DDeenniiaall ooff sseerrvviiccee  Attach that prevents authorized user from accessing the system MMaann iinn tthhee mmiiddddllee  Network communication is intercepted in an attempt to obtain key data
  • 11. MMoorree AAttttaacckkss…… 1. Packet Sniffing (Internet traffic consists of data “packets”, and these can be “sniffed”) 2. Man in the Middle(Insert a router in the path between client and server, and change the packets as they pass through) 3. DNS hijacking(Insert malicious routes into DNS tables to send traffic for genuine sites to malicious sites) 4. Phishing(An evil website pretends to be a trusted website) Example: 1. You type, by mistake, “mibank.com” instead of “mybank.com” mibank.com designs the site to look like mybank.com so the user types in their info as usual 2. BAD! Now an evil person has your info!
  • 12. VViirruuss Piece of code that automatically reproduces itself. It’s attached to other programs or files, but requires user intervention to propagate. Attacks on Computer For Virus i. Infect Executable files ii. Infect Boot sectors iii. Infect Documents (macros), scripts (web pages), etc. Source of Virus It can be create itself in computer system. It also create with storage elements, mails, downloaded files or shared folders.
  • 13. WWoorrmm Piece of code that automatically reproduces itself over the network. It doesn’t need the user intervention to propagate (autonomous). Attacks on Computer For Worm It infects computer via buffer overflow, file sharing, configuration errors and other vulnerabilities. What It search? It search Email addresses, DNS, IP, network neighborhood for hacking or Malicious programs Backdoor, DDoS agent, etc.
  • 14. SSoocciiaall EEnnggiinneeeerriinngg •Manipulating a person or persons into divulging confidential information.  Would us also have to aware about this? 1. Yes, cause Social engineers are a lot more cunning than you. 2. It also can Happen with Corporate Executive & Most of theme are fooled by this hackers.
  • 15. HHeerree’’ss aa ssmmaallll EExxaammppllee ooff SSoocciiaall eennggiinneeeerr’’ss wwoorrkk....
  • 16. HHooww ccaann wwee pprrootteecctt oouurr CCoommppuutteerrss & UUss ffrroomm tthhiiss kkiinndd ooff tthhrreeaattss.... For computer access 1. User knowledge (Name, password, PIN) 2. Smart card (A card with an embedded memory chip used for identification) 3. Biometrics (Human characteristics such as fingerprints, retina or voice patterns)
  • 17. GGuuiiddeelliinnee FFoorr PPaasssswwoorrdd........ 1. Easy to remember, hard to guess 2. Don’t use family or pet names 3. Don’t make it accessible 4. Use combination uppercase/lowercase letters, digits and special characters 5. Don’t leave computer when logged in 6. Don’t ever tell anyone 7. Don’t include in an email 8. Don’t use the same password in lots of places
  • 18. OOnn IInntteerrnneett CAPTCHA Software that verifies that the user is not another computer You have to look at a weird set of characters and key them back in. Why does this work?
  • 20. Some Other Techniques of Securing Computer.... Ensuring computer and network security i. Cryptography ii. Secure networks iii. Antivirus software iv. Firewalls In addition, users have to practice “safe computing” 1. Not downloading from unsafe websites 2. Not opening attachments 3. Not trusting what you see on websites 4. Avoiding Scams
  • 21. CCrryyppttooggrraapphhyy Secret Codes  Encryption o Converting data to unreadable codes to prevent anyone form accessing this information. o Need a “key” to find the original data – keys take a few million-trillion years to guess.  Public keys An ingenious system of proving you know your password without disclosing your password. Also used for digital signatures. o Used heavily in SSL connections.  Hashing o Creating fingerprints of documents.
  • 22. Conclusion Its not that easy to protect yourself or your computer from threats & attacks. But its not that much harder either. So just follow some rules & you are protected from this threats & attacks. Computer security is for protect the user. So we will follow the rules to protect ourselves.