SlideShare a Scribd company logo
2
Most read
3
Most read
15
Most read
Introduction
• We live in a world at a time which is often called
InformationAge.
• Internet has revolutionized the world and people are getting
used to having access to whatever information they want
anytime, anywhere.
• Unfortunately, this also has resulted in increased security
concerns.
• This chapter talks about the threats that are associated with
online access and the measures to prevent and counter them.
Threats to Computer
Security
• A Threat is a potential violation of security. When a threat is
actually executed, it becomes attack. Those who executes such
actions, or cause them to be executed are called attackers.
• Some common threats the average computer user faces
everyday are-
1. Viruses :
2. Worms
3. Trojans
4. Spyware
5. Adware
6. Spamming
7. PC Intrusion:
8. Denial of Service
9. Sweeping
10. Password Guessing
11. Phishing
• They are also known as Malware that harms your computer.
Computer Viruses
• Computer Virus are malicious code/programs that cause damage to data
and files on a system.
• Virus can attack any part of a computer’s software such as boot sector,
operating system, system areas, files, applications-program-macro etc.
• Two other similar programs also cause virus like effects. These are-
• Worms: a worm is a self replicating program which eats up the entire disk
space or memory. A worm keeps on creating its copies until all the disk
space or memory is filled.
• Trojans Hoursesa A destructive program that masquerades as a benign
application. Unlike viruses, Trojan horses do not replicate themselves but they
can be just as destructive. One of the most insidious types of Trojan horse is a
program that claims to rid your computer of viruses but instead
introduces viruses onto your computerDamages caused by Viruses:
– Damage or Delete files.
– Slow down your computer.
– Invade your email programs.
Spyware
• Spyware is a software which is installed on your computer to spy on
your activities and report this data to people willing to pay for it.
• Spyware mostly get installed on your PC without your consent.
• Roughly 32% computers of the world are infected with some type of
Malware.
• Damages caused by Spyware :
• Compromises your data,
computing habits and identity.
– Alter PC settings.
– Slow down your PC.
Adware
• These are the programs that deliver unwanted ads to your
computer. They consume your network bandwidth. Adware is similar
to spyware. You have to be very careful while installing a software.
• Damages caused by Adware:
– Adware tracks your information
just like spyware.
– Displays arrays of
advertising.
– Slow down your PC.
Spamming
Spamming refers to the sending of bulk-mail by an
identified or unidentified source.in malicious form, the
attacker keeps on sending bulk mail until the mail-server
runs out of disk space.
• Damages caused by Spamming-
• Spam reduces productivity.
• Spam eats up your time.
• Spam can lead to worse things.
PC Intrusion
Every PC connected to the internet is a potential target for
hackers. PC intrusion can occur in any of the following form-
• Sweeper Attack :
This is another malicious program used by
hackers which sweeps all the data from the
system.
• Denial of Services:
This eats up all the resources of the system
and the system come to a halt.
• Password Guessing:
Most hackers crack or guess passwords of
system accounts and gain entry into remote
computer systems.
Eavesdropping
• Unauthorized monitoring of other people's communications is
called Eavesdropping.
• Eavesdropping can be carried out through all communication
devices and media of today-telephone, emails, messaging,
other internet services.
• To prevent this, email messages have to be encrypted and
digital signature are also effective.
Phishing and Pharming
• In Phishing, an imposter uses an authentic looking e-mail or
website to trick recipients into giving out sensitive personal
information which may later used for cyber crimes and frauds.
• Pharming is an attack in which a hacker attempts to redirect a
website’s traffic to another, bogus website. Even if the URL is
correct, it can still be redirect to a fake website.
Cookies
• A Cookie is a small piece of data sent from a website and stored in a user’s
web browser. Some cookies disappears after user closes his browser while
others, know as tracking cookies, remain saved and load the next ime user
visits the same website.
• These cookies help track user’s browsing sessions and load information
faster, but create some security and privacy concerns as well.
These security and privacy concerns are-
1. Session Data : when you visit a website regularly, you may not have to
enter your user name and password to get in because the information is
being pulled from a tracking cookie. If somebody found out the encryption
key and acquired your cookies, he could discover your passwords.
2. Tracking Information : when you visit certain websites with
advertisements, those ads create cookie that store and track your online
patterns.
3. Public Computers : when you work on a public computer in a similar
manner as you work on personal computer, the people who have access
to those computer may access your information also.
Solutions to Computer Security Threat
• The entire computer security is based on a system of
actions and safeguards which have been categorized
in two ways-
1. Active Protection : It includes installing and using
an antivirus that have internet security also which
shows protection against threats such as viruses,
spyware and PC intrusion.
2. Preventive Mesures : Even though security
programs may actively detect and eliminate any
threats your PC encounters, you should always help
to prevent these issues from ever arising.
Solutions to Virus, Adware and Spyware
• Active Protection :
1. Use Anti-Virus and Anti-Spyware.
2. Download updates regularly.
3. Run frequent full-system scans.
• Preventive Measure :
1. Keep your system up-to-date.
2. Use caution when downloading files on the Internet.
3. Be careful with email.
4. Disable cookies, if possible.
Solutions to Spam and Eavesdropping
• Active Protection :
1. Use Anti-Virus.
2. Update your Anti-Virus regularly.
• Preventive Measure :
1. Keep your email address private.
2. Use encryption in emails.
3. Be careful with E-mails.
4. Install Internet security services.
Solution to PC intrusion
• Active Protection :
1. Authorization
2. Authentication
3. Firewall
• Preventive Measure :
1. Use Proper File Access Permission.
2. Disconnect from internet when away.
Solutions to Phishing and pharming attack
• Active Protection :
1. Take the computer offline.
2. Backup all files on the hard drive.
3. List the information given to Phishing scammers.
4. Run Antivirus software.
5. Contact credit agencies to report any possibilities of
identity theft.
• Preventive Measure :
1. Don’t open emails from unknown sources.
2. When in doubt, do not click.
Firewall
• An Internet Firewall is a device or a software that is designed to
protect your computer from data and viruses that you do not want. A
firewall is so called because of the real firewalls used to secure
buildings.
• Software Firewall: A software firewall is a special type of
software running on a computer. It protects your computer from
outside attempts to control or gain access.
• Hardware Firewall: It is a physical piece of equipment
designed to perform firewall duties. A hardware firewall may actually
be another computer or dedicated piece of equipment which serves
as a firewall.

More Related Content

PPTX
Art integrated project of computer science class 12
PPTX
Cyber ethics(CBSE Class X), Computer Application
PPTX
Ethics and safety measures in Computing
PPTX
Virus class 7
PDF
Computer Security Threats
PDF
Web Applications and Security notes Class 10 IT (402).pdf
PPTX
Class viii ch-2 log on to access
PPTX
Virus and antivirus
Art integrated project of computer science class 12
Cyber ethics(CBSE Class X), Computer Application
Ethics and safety measures in Computing
Virus class 7
Computer Security Threats
Web Applications and Security notes Class 10 IT (402).pdf
Class viii ch-2 log on to access
Virus and antivirus

What's hot (20)

PDF
Society law & ethics.pdf
PPTX
Computer System Overview Class XI CS
PPTX
Chp-15 Cyber Safety ppt-std 11.pptx
PPTX
Information technology art INTEGRATION project on cyber crime , Smruti Rekha ...
PPTX
Cyber Safety Class 9
PPTX
Cyber safety and cyber security
PPTX
Cyber crime in India PPT .pptx
PPTX
Cyber security ppt
PPT
Virus project
PPTX
Computer Vandalism
PPTX
Computer Science Class 11 India PPT
PPTX
Computer networking For Class XII
PPTX
Computer Project on Cyber Safety
PPTX
Cyber security system presentation
PPTX
Cyber crime
PPTX
SECURITY THREATS AND SAFETY MEASURES
PDF
BANK MANAGEMENT INVESTIGATORY PROJECT CLASS 12TH
PPTX
Chapter 1 computer fundamentals
PPTX
Cyber security
DOCX
how to write a certificate
Society law & ethics.pdf
Computer System Overview Class XI CS
Chp-15 Cyber Safety ppt-std 11.pptx
Information technology art INTEGRATION project on cyber crime , Smruti Rekha ...
Cyber Safety Class 9
Cyber safety and cyber security
Cyber crime in India PPT .pptx
Cyber security ppt
Virus project
Computer Vandalism
Computer Science Class 11 India PPT
Computer networking For Class XII
Computer Project on Cyber Safety
Cyber security system presentation
Cyber crime
SECURITY THREATS AND SAFETY MEASURES
BANK MANAGEMENT INVESTIGATORY PROJECT CLASS 12TH
Chapter 1 computer fundamentals
Cyber security
how to write a certificate
Ad

Similar to Online access and computer security.pptx_S.Gautham (20)

PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
PPTX
Computer security threats & prevention
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
PPT
computer_security.ppt
PPT
Computer security and malware by shahzad younas
DOCX
Computer virus
PPTX
Chapter 5.pptx
PPTX
Computer Security Presentation
PPTX
Computer Scienc-WPS Office.pptx
PDF
Type of Security Threats and its Prevention
PPTX
TheCyberThreatAndYou2_deck.pptx
PPSX
csa2014 IBC
PPT
Security
PPTX
BCE L-3omputer security Basics.pptx
PPTX
shubhangi.pptx
PPTX
GE9a- Living in the IT Era: Internet Threats.pptx
PPTX
Cyber security
PPTX
Cyber security
PPTX
Empowerment Technologies Lecture 3 (Philippines SHS)
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
Computer security threats & prevention
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
computer_security.ppt
Computer security and malware by shahzad younas
Computer virus
Chapter 5.pptx
Computer Security Presentation
Computer Scienc-WPS Office.pptx
Type of Security Threats and its Prevention
TheCyberThreatAndYou2_deck.pptx
csa2014 IBC
Security
BCE L-3omputer security Basics.pptx
shubhangi.pptx
GE9a- Living in the IT Era: Internet Threats.pptx
Cyber security
Cyber security
Empowerment Technologies Lecture 3 (Philippines SHS)
Ad

Recently uploaded (20)

PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Business Ethics Teaching Materials for college
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Pre independence Education in Inndia.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Types and Its function , kingdom of life
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Complications of Minimal Access Surgery at WLH
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Institutional Correction lecture only . . .
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Supply Chain Operations Speaking Notes -ICLT Program
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Business Ethics Teaching Materials for college
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Pre independence Education in Inndia.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
01-Introduction-to-Information-Management.pdf
Final Presentation General Medicine 03-08-2024.pptx
Cell Types and Its function , kingdom of life
human mycosis Human fungal infections are called human mycosis..pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Complications of Minimal Access Surgery at WLH
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Institutional Correction lecture only . . .
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf

Online access and computer security.pptx_S.Gautham

  • 1. Introduction • We live in a world at a time which is often called InformationAge. • Internet has revolutionized the world and people are getting used to having access to whatever information they want anytime, anywhere. • Unfortunately, this also has resulted in increased security concerns. • This chapter talks about the threats that are associated with online access and the measures to prevent and counter them.
  • 2. Threats to Computer Security • A Threat is a potential violation of security. When a threat is actually executed, it becomes attack. Those who executes such actions, or cause them to be executed are called attackers. • Some common threats the average computer user faces everyday are- 1. Viruses : 2. Worms 3. Trojans 4. Spyware 5. Adware 6. Spamming 7. PC Intrusion: 8. Denial of Service 9. Sweeping 10. Password Guessing 11. Phishing • They are also known as Malware that harms your computer.
  • 3. Computer Viruses • Computer Virus are malicious code/programs that cause damage to data and files on a system. • Virus can attack any part of a computer’s software such as boot sector, operating system, system areas, files, applications-program-macro etc. • Two other similar programs also cause virus like effects. These are- • Worms: a worm is a self replicating program which eats up the entire disk space or memory. A worm keeps on creating its copies until all the disk space or memory is filled. • Trojans Hoursesa A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computerDamages caused by Viruses: – Damage or Delete files. – Slow down your computer. – Invade your email programs.
  • 4. Spyware • Spyware is a software which is installed on your computer to spy on your activities and report this data to people willing to pay for it. • Spyware mostly get installed on your PC without your consent. • Roughly 32% computers of the world are infected with some type of Malware. • Damages caused by Spyware : • Compromises your data, computing habits and identity. – Alter PC settings. – Slow down your PC.
  • 5. Adware • These are the programs that deliver unwanted ads to your computer. They consume your network bandwidth. Adware is similar to spyware. You have to be very careful while installing a software. • Damages caused by Adware: – Adware tracks your information just like spyware. – Displays arrays of advertising. – Slow down your PC.
  • 6. Spamming Spamming refers to the sending of bulk-mail by an identified or unidentified source.in malicious form, the attacker keeps on sending bulk mail until the mail-server runs out of disk space. • Damages caused by Spamming- • Spam reduces productivity. • Spam eats up your time. • Spam can lead to worse things.
  • 7. PC Intrusion Every PC connected to the internet is a potential target for hackers. PC intrusion can occur in any of the following form- • Sweeper Attack : This is another malicious program used by hackers which sweeps all the data from the system. • Denial of Services: This eats up all the resources of the system and the system come to a halt. • Password Guessing: Most hackers crack or guess passwords of system accounts and gain entry into remote computer systems.
  • 8. Eavesdropping • Unauthorized monitoring of other people's communications is called Eavesdropping. • Eavesdropping can be carried out through all communication devices and media of today-telephone, emails, messaging, other internet services. • To prevent this, email messages have to be encrypted and digital signature are also effective. Phishing and Pharming • In Phishing, an imposter uses an authentic looking e-mail or website to trick recipients into giving out sensitive personal information which may later used for cyber crimes and frauds. • Pharming is an attack in which a hacker attempts to redirect a website’s traffic to another, bogus website. Even if the URL is correct, it can still be redirect to a fake website.
  • 9. Cookies • A Cookie is a small piece of data sent from a website and stored in a user’s web browser. Some cookies disappears after user closes his browser while others, know as tracking cookies, remain saved and load the next ime user visits the same website. • These cookies help track user’s browsing sessions and load information faster, but create some security and privacy concerns as well. These security and privacy concerns are- 1. Session Data : when you visit a website regularly, you may not have to enter your user name and password to get in because the information is being pulled from a tracking cookie. If somebody found out the encryption key and acquired your cookies, he could discover your passwords. 2. Tracking Information : when you visit certain websites with advertisements, those ads create cookie that store and track your online patterns. 3. Public Computers : when you work on a public computer in a similar manner as you work on personal computer, the people who have access to those computer may access your information also.
  • 10. Solutions to Computer Security Threat • The entire computer security is based on a system of actions and safeguards which have been categorized in two ways- 1. Active Protection : It includes installing and using an antivirus that have internet security also which shows protection against threats such as viruses, spyware and PC intrusion. 2. Preventive Mesures : Even though security programs may actively detect and eliminate any threats your PC encounters, you should always help to prevent these issues from ever arising.
  • 11. Solutions to Virus, Adware and Spyware • Active Protection : 1. Use Anti-Virus and Anti-Spyware. 2. Download updates regularly. 3. Run frequent full-system scans. • Preventive Measure : 1. Keep your system up-to-date. 2. Use caution when downloading files on the Internet. 3. Be careful with email. 4. Disable cookies, if possible.
  • 12. Solutions to Spam and Eavesdropping • Active Protection : 1. Use Anti-Virus. 2. Update your Anti-Virus regularly. • Preventive Measure : 1. Keep your email address private. 2. Use encryption in emails. 3. Be careful with E-mails. 4. Install Internet security services.
  • 13. Solution to PC intrusion • Active Protection : 1. Authorization 2. Authentication 3. Firewall • Preventive Measure : 1. Use Proper File Access Permission. 2. Disconnect from internet when away.
  • 14. Solutions to Phishing and pharming attack • Active Protection : 1. Take the computer offline. 2. Backup all files on the hard drive. 3. List the information given to Phishing scammers. 4. Run Antivirus software. 5. Contact credit agencies to report any possibilities of identity theft. • Preventive Measure : 1. Don’t open emails from unknown sources. 2. When in doubt, do not click.
  • 15. Firewall • An Internet Firewall is a device or a software that is designed to protect your computer from data and viruses that you do not want. A firewall is so called because of the real firewalls used to secure buildings. • Software Firewall: A software firewall is a special type of software running on a computer. It protects your computer from outside attempts to control or gain access. • Hardware Firewall: It is a physical piece of equipment designed to perform firewall duties. A hardware firewall may actually be another computer or dedicated piece of equipment which serves as a firewall.