SlideShare a Scribd company logo
Computer Security
Vulnerabilities and Solutions.
By Roshan Kumar Bhattarai
Table of contents:
• Introduction
• Understanding Hacking.
• Types of Hackers.
• Vulnerabilities: Viruses and other threats.
• Solutions for day-to-day life.
• Conclusions.
Introduction to Internet
• What is Internet?
• The Internet is the global system of interconnected
computer networks that use the Internet protocol suite
(TCP/IP) to link billions of devices worldwide.
• It is a network of networks that consists of millions of
private, public, academic, business, and government
networks of local to global scope, linked by a broad array of
electronic, wireless, and optical networking technologies.
• The Internet carries an extensive range of information
resources and services, such as mobile apps including social
media apps, the inter-linked hypertext documents
and applications of the World Wide Web (WWW), electronic
mail, multiplayer online games, telephony, and peer-to-
peer networks for file sharing.
Hackers, Crackers and Ethical Hackers
 What is Hacking?
The act of accessing systems without authorization is hacking. In other words breaching
into others’ system without having the required credentials. Hacking is about entering a
system without Username and Passwords.
• Hacker is the person who is involved in the act of hacking.
What is cracking?
The act of destroying a system after hacking is called cracking.
• Cracker is the person who is involved in the act of Cracking.
 What is Ethical Hacking?
The act of hacking a system with prior permission from the owner to check the weakness
of a system is called Ethical Hacking.
Ethical Hacker or Cyber Security Expert is the person who is involved in the act of
Ethical Hacking.
Three categories of hackers:
• White hat hackers: A white hat hacker is a computer security specialist who
breaks into protected systems and networks to test and asses their security.
White hat hackers use their skills to improve security by exposing vulnerabilities
before malicious hackers (known as black hat hackers) can detect and exploit
them.
• Black hat hackers: A black hat hacker is an individual with extensive computer
knowledge whose purpose is to breach or bypass internet security. Black hat
hackers are also known as crackers or dark-side hackers.
• Grey hat hackers: The term "grey hat" or "gray hat" in Internet slang refers to a
computer hacker or computer security expert whose ethical standards fall
somewhere between purely altruistic and purely malicious. They are devoted to
help the people but doing wrong things like hacking government websites. They
are concerned about the society.
Vulnerabilities:
• What is Computer Virus?
• A computer virus is a program or piece of code
that is loaded onto your computer without your
knowledge and runs against your
wishes. Viruses can also replicate themselves.
• A computer virus might corrupt or delete data
on your computer, use your email program
to spread itself to other computers, or even
erase everything on your hard disk. Computer
viruses are often spread by attachments in
email messages or instant messaging messages
and spread themselves with the help of flash
drives inserted into the infected computers.
Types of Computer Viruses:
• Worms: A computer worm is a
standalone malware computer
program that replicates itself in
order to spread to other
computers.
• Trojan Horse: A Trojan horse, often
shortened to Trojan, is a type of
malware designed to provide
unauthorized, remote access to a
user's computer.
Phising Attack
• Phishing is the attempt to acquire
sensitive information such as
usernames, passwords, and credit card
details (and sometimes, indirectly,
money), often for malicious reasons, by
masquerading as a trustworthy entity in
an electronic communication.
• Usually hackers make fake login pages
and send them to the users as links
through email. The credentials are sent
to the attacker when the user tries to
log in to the page.
DoS Attacks: Denial Of Service
• In computing, a denial-of-service (DoS) attack is
an attempt to make a machine or network
resource unavailable to its intended users, such as
to temporarily or indefinitely interrupt or suspend
services of a host connected to the Internet.
Common Solutions:
• Anti-Viruses: The programs designed to detect and destroy computer viruses.
• Allow firewall to protect your system.
• Do not authorize unknown apps in social media.
• Do not open social media/banking sites from external links. Always type the
address in the browser.
• Scan flash devices using anti-virus.
• Do not disclose your personal information to strangers in social media.
• Do not connect to unknown Wi-Fi and other networks. When not in use turn off
Bluetooth and Wi-Fi adapter.
• Before you download any apps make sure it has the encryptions which will
protect your privacy.
• Learn more about Computer and internet security it is no more limited to techies.
Demonstrations
Thank you!
Login to www.roshankumarbhattarai.com for any help.

More Related Content

PPTX
Computer hacking
PPTX
Cyber crime and security
PPTX
Ethical hacking
PPTX
Hacking and Hackers
PPTX
Ethical Hacking
PPTX
ethical hacking
ODP
Ethical hacking ppt
PPT
Ethical hacking
Computer hacking
Cyber crime and security
Ethical hacking
Hacking and Hackers
Ethical Hacking
ethical hacking
Ethical hacking ppt
Ethical hacking

What's hot (20)

PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPT
Ethical hacking presentation
PPTX
Hacking
PPTX
Ethical Hacking Overview
PPTX
How to hack or what is ethical hacking
PPTX
Introduction Ethical hacking by eslam hussein
PPTX
Hacking (cs192 report )
PPTX
Computer virus
PPT
All about Hacking
PPT
Hacking
PPT
It security &_ethical_hacking
PPTX
Internet Issues (How to Deal on Internet Security)
PPTX
Computer Security and Ethics
PPT
What is Ethical hacking
PPTX
Hacking and Types of Hacker.
PPTX
Ethical Hacking
PPTX
Computer and Internet hacking
PPTX
Hacking
PPTX
Ethical hacking
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking presentation
Hacking
Ethical Hacking Overview
How to hack or what is ethical hacking
Introduction Ethical hacking by eslam hussein
Hacking (cs192 report )
Computer virus
All about Hacking
Hacking
It security &_ethical_hacking
Internet Issues (How to Deal on Internet Security)
Computer Security and Ethics
What is Ethical hacking
Hacking and Types of Hacker.
Ethical Hacking
Computer and Internet hacking
Hacking
Ethical hacking
Ad

Viewers also liked (20)

PPTX
Is hacking good or bad
PPTX
PPTX
Hacking 1
PPTX
What is hacking | Types of Hacking
PPTX
Cybercrime (Computer Hacking)
PPT
Basic Introduction to hacking
PPTX
Evaporation
PPT
Evaporation New Template
PDF
Hacking Movable Type
PPT
Hacking
PPTX
AMAZING COMPUTER TRICKS
PPTX
Science - Evaporation
PPTX
Group 4 (evaporation)
PPTX
Soil Steady-State Evaporation
PPT
Water evaporation reduction from lakes
PDF
CFD-based Evaporation Estimation Approach
PPT
Hacking And EthicalHacking By Satish
PDF
Hacking sites for fun and profit
PDF
Evaporation 4 slides
PPTX
Hacking
Is hacking good or bad
Hacking 1
What is hacking | Types of Hacking
Cybercrime (Computer Hacking)
Basic Introduction to hacking
Evaporation
Evaporation New Template
Hacking Movable Type
Hacking
AMAZING COMPUTER TRICKS
Science - Evaporation
Group 4 (evaporation)
Soil Steady-State Evaporation
Water evaporation reduction from lakes
CFD-based Evaporation Estimation Approach
Hacking And EthicalHacking By Satish
Hacking sites for fun and profit
Evaporation 4 slides
Hacking
Ad

Similar to Internet and personal privacy (20)

PPTX
Cyber crimes publicspeaking
PPTX
Cyber terrorism
PPTX
Cyber crime & security
PPTX
Cyber Security Fundamentals and Ethical hackingpptx
PPTX
Computer Security Presentation
PPT
CyberSecurity presentation for basic knowledge about this topic
PPT
cyber crime and privacy issues by varun call for assistence 8003498888
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
PPTX
Lect 3 INFORMATION SYSTEMS SECURITY THREATS.pptx
PPTX
CYBER SECURITY
PPTX
Ethics,security and privacy control
PPTX
Computer Security risks Shelly
DOCX
Computer virus
PPTX
Cyber Space
PPTX
Cyber security
PPTX
Cyber Security
PPTX
Cyber Security
PPTX
Cyber Crime
PDF
Computer security
PDF
ppt pdf ajay.pdf
Cyber crimes publicspeaking
Cyber terrorism
Cyber crime & security
Cyber Security Fundamentals and Ethical hackingpptx
Computer Security Presentation
CyberSecurity presentation for basic knowledge about this topic
cyber crime and privacy issues by varun call for assistence 8003498888
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
Lect 3 INFORMATION SYSTEMS SECURITY THREATS.pptx
CYBER SECURITY
Ethics,security and privacy control
Computer Security risks Shelly
Computer virus
Cyber Space
Cyber security
Cyber Security
Cyber Security
Cyber Crime
Computer security
ppt pdf ajay.pdf

Recently uploaded (20)

PDF
Exploring VPS Hosting Trends for SMBs in 2025
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
si manuel quezon at mga nagawa sa bansang pilipinas
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
The-Importance-of-School-Sanitation.pptx
PPTX
Internet Safety for Seniors presentation
PDF
The Evolution of Traditional to New Media .pdf
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPT
Ethics in Information System - Management Information System
PPT
250152213-Excitation-SystemWERRT (1).ppt
PPTX
Reading as a good Form of Recreation
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
t_and_OpenAI_Combined_two_pressentations
PDF
Understand the Gitlab_presentation_task.pdf
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
Exploring VPS Hosting Trends for SMBs in 2025
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
si manuel quezon at mga nagawa sa bansang pilipinas
artificialintelligenceai1-copy-210604123353.pptx
The-Importance-of-School-Sanitation.pptx
Internet Safety for Seniors presentation
The Evolution of Traditional to New Media .pdf
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Ethics in Information System - Management Information System
250152213-Excitation-SystemWERRT (1).ppt
Reading as a good Form of Recreation
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
Mathew Digital SEO Checklist Guidlines 2025
t_and_OpenAI_Combined_two_pressentations
Understand the Gitlab_presentation_task.pdf
Power Point - Lesson 3_2.pptx grad school presentation
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
Uptota Investor Deck - Where Africa Meets Blockchain

Internet and personal privacy

  • 1. Computer Security Vulnerabilities and Solutions. By Roshan Kumar Bhattarai
  • 2. Table of contents: • Introduction • Understanding Hacking. • Types of Hackers. • Vulnerabilities: Viruses and other threats. • Solutions for day-to-day life. • Conclusions.
  • 3. Introduction to Internet • What is Internet? • The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide. • It is a network of networks that consists of millions of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. • The Internet carries an extensive range of information resources and services, such as mobile apps including social media apps, the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, multiplayer online games, telephony, and peer-to- peer networks for file sharing.
  • 4. Hackers, Crackers and Ethical Hackers  What is Hacking? The act of accessing systems without authorization is hacking. In other words breaching into others’ system without having the required credentials. Hacking is about entering a system without Username and Passwords. • Hacker is the person who is involved in the act of hacking. What is cracking? The act of destroying a system after hacking is called cracking. • Cracker is the person who is involved in the act of Cracking.  What is Ethical Hacking? The act of hacking a system with prior permission from the owner to check the weakness of a system is called Ethical Hacking. Ethical Hacker or Cyber Security Expert is the person who is involved in the act of Ethical Hacking.
  • 5. Three categories of hackers: • White hat hackers: A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. • Black hat hackers: A black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Black hat hackers are also known as crackers or dark-side hackers. • Grey hat hackers: The term "grey hat" or "gray hat" in Internet slang refers to a computer hacker or computer security expert whose ethical standards fall somewhere between purely altruistic and purely malicious. They are devoted to help the people but doing wrong things like hacking government websites. They are concerned about the society.
  • 6. Vulnerabilities: • What is Computer Virus? • A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. • A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk. Computer viruses are often spread by attachments in email messages or instant messaging messages and spread themselves with the help of flash drives inserted into the infected computers.
  • 7. Types of Computer Viruses: • Worms: A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. • Trojan Horse: A Trojan horse, often shortened to Trojan, is a type of malware designed to provide unauthorized, remote access to a user's computer.
  • 8. Phising Attack • Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. • Usually hackers make fake login pages and send them to the users as links through email. The credentials are sent to the attacker when the user tries to log in to the page.
  • 9. DoS Attacks: Denial Of Service • In computing, a denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
  • 10. Common Solutions: • Anti-Viruses: The programs designed to detect and destroy computer viruses. • Allow firewall to protect your system. • Do not authorize unknown apps in social media. • Do not open social media/banking sites from external links. Always type the address in the browser. • Scan flash devices using anti-virus. • Do not disclose your personal information to strangers in social media. • Do not connect to unknown Wi-Fi and other networks. When not in use turn off Bluetooth and Wi-Fi adapter. • Before you download any apps make sure it has the encryptions which will protect your privacy. • Learn more about Computer and internet security it is no more limited to techies.
  • 12. Thank you! Login to www.roshankumarbhattarai.com for any help.