SlideShare a Scribd company logo
COMPUTER & DATA SECURITY
Introduction to Computing
CHAPTER #
11
Introduction to Computing 2Chapter # 11
Security
 Security is about the protection of assets
 It can be computer, network or data security
 Security is a set of procedures that protect
 You, your employees, and your peers
 Paper or electronic media
 Hardware, software, and networks
 It protects from damage, theft, or change
 There can be different security measures
 Prevention
 measures taken to protect your assets from being damaged
 Detection
 measures taken to allow you to detect when an asset has been damaged,
how it was damaged and who damaged it
 Reaction
 measures that allow you to recover your assets
Introduction to Computing 3Chapter # 11
Computer Security
 Computer security is information security as applied to
computers and networks
 The field covers all the processes and mechanisms by which
computer-based equipment, information, networks and
services are protected from unintended or unauthorized
access, change or destruction
 It also includes protection from unplanned events and natural
disasters
Introduction to Computing 4Chapter # 11
Security Properties
 Confidentiality
 ensures that the data is only read by the intended recipients
 Integrity
 ensures that all of the data has not been corrupted from its
original source
 The system continues to operate properly.
 Availability
 Actions by an attacker do not prevent users from having access
to use of the system
 guarantees that the data is usable upon demand
 Accountability
 it is audit information that is kept and protected so that security
actions can be traced to the responsible party
Introduction to Computing 5Chapter # 11
Highly Vulnerable
 Financial institutions and banks
 Internet service providers
 Government and defense agencies
 Multinational corporations
 Pharmaceutical companies
 Contractors to various government agencies
 Anyone on the Internet
Introduction to Computing 6Chapter # 11
Types of Attacks
 Denial of Service (D.o.S) attacks
 D.o.S attacks have one goal – to knock your service off the net
 Crash your host
 Flood your host
 Flood the network connecting to your host
 Viruses
 A computer virus attaches itself to files on the target machine
 Master Boot Sector/Boot Sector viruses
 File viruses, Macro viruses
 Stealth viruses, Polymorphic viruses
Introduction to Computing 7Chapter # 11
Types of Attacks
 Trojans
 Trojans are programs that appear to perform a desirable and necessary
function that perform functions unknown to (and probably unwanted
by) the user
 Worms
 Worms are memory resident viruses
 Unlike a virus, which seeds itself in the computer's hard disk or file system,
a worm will only maintain a functional copy of itself in active memory
 Worms frequently “sleep” until some event triggers their activity
 e.g. send password file to hacker, send copy of registry to hacker
 Worms and Trojans are frequent methods by which Backdoors are
enabled on a system
 Backdoors
 Such programs give remote access to the computer from anywhere on
the Internet
 e.g. Back Orifice, BO2K, Sub-Seven)
Introduction to Computing 8Chapter # 11
Types of Attacks
 Sniffers
 Devices that capture network packets
 Extremely difficult to detect because they are passive
 Scanners
 Programs that automatically detect security weaknesses in remote or local
hosts
 Tells the hacker
 What services are currently running
 What users own those services
 Whether anonymous logins are supported
 Whether certain network services require authentication
 Password Crackers
 Some actually try to decrypt
 Most simply try “brute force” or intelligent “brute force”
 Dictionary words, days of year, initials
Introduction to Computing 9Chapter # 11
Types of Attacks
 Social Engineering
 “This is MIS, I can fix your e-mail box, what’s your password?”
 Email Spoofing
 It tricks the user in believing that the email originated from a certain
user such as an administrator although it actually originated from a
hacker
 Such emails may solicit personal information such as credit card details
and passwords
 Examining the email header may provide some additional information
about the origin of the email
Introduction to Computing 10Chapter # 11
How Do We Protect
 Anti-virus software
 Personal Anti-virus SW on your machine
 Make sure it is set to scan all executables, compressed files,
e-mail, e-mail attachments, web pages
 Keep your virus information files up to date!!!
 Firewalls
 A combination of hardware and software resources positioned
between the local (trusted) network and [an untrusted network]
 It ensures that all communication between an organization's network
and the Internet connection conforms to the organization's security
policy
 It tracks and controls communications, deciding whether to pass,
reject, encrypt, or log communications
Introduction to Computing 11Chapter # 11
Cryptography
 Cryptography is the practice and study of techniques for secure
communication in the presence of third parties
 Modern cryptography intersects the disciplines of mathematics, computer
science, and electrical engineering
 Applications of cryptography include ATM cards, computer passwords,
and electronic commerce
 Simply – secret codes
 Encryption
 Converting data to unreadable codes to prevent anyone form accessing this
information
 Need a “key” to find the original data
 keys take a few million-trillion years to guess
 Public keys
 An ingenious system of proving you know your password without disclosing your
password. Also used for digital signatures
 Used heavily in SSL connections
 Hashing
 Creating fingerprints of documents
Introduction to Computing 12Chapter # 11
Cryptography
Symmetric encryption
Authentication
Asymmetric encryption
Public Key Infrastructure
Introduction to Computing 13Chapter # 11
Steganography
 Steganography is the art and science of writing hidden
messages in such a way that no one, apart from the sender
and intended recipient, suspects the existence of the
message
 It is a form of security through obscurity
 Message appears to be something else
 images, articles, shopping lists, or some other cover-text
 Classically, the hidden message may be in invisible ink
between the visible lines of a private letter
 Messages do not attract attention to themselves
 It is high security technique for long data transmission
Introduction to Computing 14Chapter # 11
Watermarking
 Watermarking is the process of hiding digital information in a
carrier signal
 It is a technique in which a kind of marker is embedded in a
signal such as audio or image data
 Used to identify ownership of the copyright of such signal
 Digital watermarks may be used to verify the authenticity or
integrity of the carrier signal or to show the identity of its
owners
 It is prominently used for tracing copyright infringements and
for banknote authentication

More Related Content

PPT
Infomation System Security
PPT
Network management and security
PPT
Information System Security introduction
PPTX
Network security
PPT
Windows network security
PPT
Computer security
PPTX
Networking infrastructure
PPTX
Security Mechanisms
Infomation System Security
Network management and security
Information System Security introduction
Network security
Windows network security
Computer security
Networking infrastructure
Security Mechanisms

What's hot (20)

PPTX
02 introduction to network security
PPTX
Network security
PPT
Network security
PPT
Chapter 01
PDF
Network security chapter 1
PPTX
Network Security Issues
PPTX
Internet Security
PPT
Network Security
PDF
Network Security Fundamentals
PPTX
Network Security
PDF
Network security - OSI Security Architecture
ODP
keamanan komputer / computer security
PPT
Network Security
PPTX
OSI Security Architecture
PDF
Chapter 3, Data Protection vs Ransomware
PPTX
Data Network Security
PPTX
Network Security and Firewall
PPTX
Ppt.1
PPTX
Presentation1 new (1) (1)cf
PPTX
Network Security: Attacks, Tools and Techniques
02 introduction to network security
Network security
Network security
Chapter 01
Network security chapter 1
Network Security Issues
Internet Security
Network Security
Network Security Fundamentals
Network Security
Network security - OSI Security Architecture
keamanan komputer / computer security
Network Security
OSI Security Architecture
Chapter 3, Data Protection vs Ransomware
Data Network Security
Network Security and Firewall
Ppt.1
Presentation1 new (1) (1)cf
Network Security: Attacks, Tools and Techniques
Ad

Similar to Itc chapter # 11 (20)

PPTX
cybersecurity
PPTX
Computer security and
PPT
Tutorial 09 - Security on the Internet and the Web
 
PDF
Information Security Lecture Notes
PPTX
Data security
PPT
Dos and Dont to be followed to protect information and technology
PDF
2.Security (1).pdfccccccccccccccccccccccccccccccccccccccccccccc
PPT
New internet security
PPT
NewIinternet security
PPTX
Computing safety ryr
PPTX
internet security
PPTX
Computer security and privacy
PPTX
PPTX
Computer security ethics_and_privacy
PPT
Computer security and_privacy_2010-2011
PPTX
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
PPTX
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
PPTX
Lecture2-InforSec-Computer and Internet security.pptx
cybersecurity
Computer security and
Tutorial 09 - Security on the Internet and the Web
 
Information Security Lecture Notes
Data security
Dos and Dont to be followed to protect information and technology
2.Security (1).pdfccccccccccccccccccccccccccccccccccccccccccccc
New internet security
NewIinternet security
Computing safety ryr
internet security
Computer security and privacy
Computer security ethics_and_privacy
Computer security and_privacy_2010-2011
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
Lecture2-InforSec-Computer and Internet security.pptx
Ad

More from National university of modern languages (20)

Recently uploaded (20)

PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
IGGE1 Understanding the Self1234567891011
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
1_English_Language_Set_2.pdf probationary
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
advance database management system book.pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Introduction to Building Materials
Weekly quiz Compilation Jan -July 25.pdf
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Practical Manual AGRO-233 Principles and Practices of Natural Farming
IGGE1 Understanding the Self1234567891011
History, Philosophy and sociology of education (1).pptx
Supply Chain Operations Speaking Notes -ICLT Program
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Chinmaya Tiranga quiz Grand Finale.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
1_English_Language_Set_2.pdf probationary
Indian roads congress 037 - 2012 Flexible pavement
Unit 4 Skeletal System.ppt.pptxopresentatiom
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
advance database management system book.pdf
Computing-Curriculum for Schools in Ghana
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
What if we spent less time fighting change, and more time building what’s rig...
Introduction to Building Materials

Itc chapter # 11

  • 1. COMPUTER & DATA SECURITY Introduction to Computing CHAPTER # 11
  • 2. Introduction to Computing 2Chapter # 11 Security  Security is about the protection of assets  It can be computer, network or data security  Security is a set of procedures that protect  You, your employees, and your peers  Paper or electronic media  Hardware, software, and networks  It protects from damage, theft, or change  There can be different security measures  Prevention  measures taken to protect your assets from being damaged  Detection  measures taken to allow you to detect when an asset has been damaged, how it was damaged and who damaged it  Reaction  measures that allow you to recover your assets
  • 3. Introduction to Computing 3Chapter # 11 Computer Security  Computer security is information security as applied to computers and networks  The field covers all the processes and mechanisms by which computer-based equipment, information, networks and services are protected from unintended or unauthorized access, change or destruction  It also includes protection from unplanned events and natural disasters
  • 4. Introduction to Computing 4Chapter # 11 Security Properties  Confidentiality  ensures that the data is only read by the intended recipients  Integrity  ensures that all of the data has not been corrupted from its original source  The system continues to operate properly.  Availability  Actions by an attacker do not prevent users from having access to use of the system  guarantees that the data is usable upon demand  Accountability  it is audit information that is kept and protected so that security actions can be traced to the responsible party
  • 5. Introduction to Computing 5Chapter # 11 Highly Vulnerable  Financial institutions and banks  Internet service providers  Government and defense agencies  Multinational corporations  Pharmaceutical companies  Contractors to various government agencies  Anyone on the Internet
  • 6. Introduction to Computing 6Chapter # 11 Types of Attacks  Denial of Service (D.o.S) attacks  D.o.S attacks have one goal – to knock your service off the net  Crash your host  Flood your host  Flood the network connecting to your host  Viruses  A computer virus attaches itself to files on the target machine  Master Boot Sector/Boot Sector viruses  File viruses, Macro viruses  Stealth viruses, Polymorphic viruses
  • 7. Introduction to Computing 7Chapter # 11 Types of Attacks  Trojans  Trojans are programs that appear to perform a desirable and necessary function that perform functions unknown to (and probably unwanted by) the user  Worms  Worms are memory resident viruses  Unlike a virus, which seeds itself in the computer's hard disk or file system, a worm will only maintain a functional copy of itself in active memory  Worms frequently “sleep” until some event triggers their activity  e.g. send password file to hacker, send copy of registry to hacker  Worms and Trojans are frequent methods by which Backdoors are enabled on a system  Backdoors  Such programs give remote access to the computer from anywhere on the Internet  e.g. Back Orifice, BO2K, Sub-Seven)
  • 8. Introduction to Computing 8Chapter # 11 Types of Attacks  Sniffers  Devices that capture network packets  Extremely difficult to detect because they are passive  Scanners  Programs that automatically detect security weaknesses in remote or local hosts  Tells the hacker  What services are currently running  What users own those services  Whether anonymous logins are supported  Whether certain network services require authentication  Password Crackers  Some actually try to decrypt  Most simply try “brute force” or intelligent “brute force”  Dictionary words, days of year, initials
  • 9. Introduction to Computing 9Chapter # 11 Types of Attacks  Social Engineering  “This is MIS, I can fix your e-mail box, what’s your password?”  Email Spoofing  It tricks the user in believing that the email originated from a certain user such as an administrator although it actually originated from a hacker  Such emails may solicit personal information such as credit card details and passwords  Examining the email header may provide some additional information about the origin of the email
  • 10. Introduction to Computing 10Chapter # 11 How Do We Protect  Anti-virus software  Personal Anti-virus SW on your machine  Make sure it is set to scan all executables, compressed files, e-mail, e-mail attachments, web pages  Keep your virus information files up to date!!!  Firewalls  A combination of hardware and software resources positioned between the local (trusted) network and [an untrusted network]  It ensures that all communication between an organization's network and the Internet connection conforms to the organization's security policy  It tracks and controls communications, deciding whether to pass, reject, encrypt, or log communications
  • 11. Introduction to Computing 11Chapter # 11 Cryptography  Cryptography is the practice and study of techniques for secure communication in the presence of third parties  Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering  Applications of cryptography include ATM cards, computer passwords, and electronic commerce  Simply – secret codes  Encryption  Converting data to unreadable codes to prevent anyone form accessing this information  Need a “key” to find the original data  keys take a few million-trillion years to guess  Public keys  An ingenious system of proving you know your password without disclosing your password. Also used for digital signatures  Used heavily in SSL connections  Hashing  Creating fingerprints of documents
  • 12. Introduction to Computing 12Chapter # 11 Cryptography Symmetric encryption Authentication Asymmetric encryption Public Key Infrastructure
  • 13. Introduction to Computing 13Chapter # 11 Steganography  Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message  It is a form of security through obscurity  Message appears to be something else  images, articles, shopping lists, or some other cover-text  Classically, the hidden message may be in invisible ink between the visible lines of a private letter  Messages do not attract attention to themselves  It is high security technique for long data transmission
  • 14. Introduction to Computing 14Chapter # 11 Watermarking  Watermarking is the process of hiding digital information in a carrier signal  It is a technique in which a kind of marker is embedded in a signal such as audio or image data  Used to identify ownership of the copyright of such signal  Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners  It is prominently used for tracing copyright infringements and for banknote authentication