0% found this document useful (0 votes)
5 views31 pages

Lecture 8

The document covers key concepts in computer security, including definitions of confidentiality, integrity, and availability, as well as terminology related to unauthorized access, hacking, and cybercrime. It discusses various types of cybercrime, the nature of viruses and spyware, and emphasizes the importance of antivirus software and firewalls for protection. Additionally, it provides measures to keep systems and data safe, such as updating software, protecting personal information, and using encrypted websites.

Uploaded by

jaffarraza.edu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views31 pages

Lecture 8

The document covers key concepts in computer security, including definitions of confidentiality, integrity, and availability, as well as terminology related to unauthorized access, hacking, and cybercrime. It discusses various types of cybercrime, the nature of viruses and spyware, and emphasizes the importance of antivirus software and firewalls for protection. Additionally, it provides measures to keep systems and data safe, such as updating software, protecting personal information, and using encrypted websites.

Uploaded by

jaffarraza.edu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

ITC/CS/SE-301

Computer Security
Lecture – 8
By
Sir, Amir Ali
Information Technology Center
Sindh Agriculture University, Tandojam
Computer Security
• Computer Security is the protection of
computing systems and the data that they
store or access.
• Computer security, also known as cyber
security or IT security, is the protection of
computer systems from the theft or damage
to their hardware, software or information.
Different Element in Computer
Security
Different Element in Computer
Security
• Confidentiality is the concealment of
information or resources. Integrity
• Integrity is the trustworthiness of data in the
systems or resources by the point of view of
preventing unauthorized and improper
changes.
• Availability refers to the ability to access
data of a resource when it is needed, as
such the information has value only if the
authorized people can access at right time.
Different terminology used in
Computer Security
• Unauthorized access - An unauthorized
access is when someone gains access to a
server, website, or other sensitive data using
someone else's account details.
• Hacker - Is a Person who tries and exploits a
computer system for a reason which can be
money, a social cause, fun etc.
• Threat - Is an action or event that might
compromise the security.
Different terminology used in
Computer Security
• Vulnerability - It is a weakness, a design
problem or implementation error in a system
that can lead to an unexpected and
undesirable event regarding security system.
• Attack - Is an assault on the system security
that is delivered by a person or a machine to a
system. It violates security.
• Antivirus or Antimalware - Is a software that
operates on different OS which is used to
prevent from malicious software.
Different terminology used in
Computer Security
• Social Engineering - Is a technique that a
hacker uses to steal data from a person for
different purposes by psychological
manipulation combined with social scenes.
• Virus - It is a malicious software that installs on
your computer without your consent for a bad
purpose.
• Firewall - It is a software or hardware which is
used to filter network traffic based on rules.
Hacking

• Hacking means using computers to commit


fraudulent acts such as fraud, privacy invasion,
stealing corporate/personal data, etc.
• A Hacker is a person who finds and exploits
the weakness in computer systems and/or
networks to gain access. Hackers are usually
skilled computer programmers with knowledge
of computer security.
Ethical Hacking

• Identifying weakness in computer systems


and/or computer networks and coming with
countermeasures that protect the weaknesses.
Ethical hackers must abide by the following
rules.
• Get written permission from the owner of the
computer system and/or computer network
before hacking.
• Protect the privacy of the organization been
hacked.
Ethical Hacking

• Transparently report all the identified


weaknesses in the computer system to the
organization.
• Inform hardware and software vendors of the
identified weaknesses.
Cyber Crime

• Cyber crime is the use of computers and


networks to perform illegal activities such as
spreading computer viruses, online bullying,
performing unauthorized electronic fund
transfers, etc.
• Most cybercrimes are committed through the
internet.
• Some cybercrimes can also be carried out
using Mobile phones via SMS and online
chatting applications.
Types of Cyber Crime

• Privacy violation: Exposing personal


information such as email addresses, phone
number, account details, etc. on social media,
websites, etc.
• Identity Theft: Stealing personal information
from somebody and impersonating that person.
• Sharing copyrighted files/information: This
involves distributing copyright protected files
such as eBooks and computer programs etc.
Types of Cyber Crime

• Electronic funds transfer: This involves


gaining an un-authorized access to bank
computer networks and making illegal fund
transfers.
• ATM Fraud: This involves intercepting ATM
card details such as account number and PIN
numbers. These details are then used to
withdraw funds from the intercepted accounts.
• Spam: Sending unauthorized emails. These
emails usually contain advertisement.
Virus

• A computer virus is a type malware that, when


executed, replicates itself by modifying other
computer programs and inserting its own
code.
• A computer virus is written to alter the way a
computer operates and that is designed to
spread from one computer to another.
• In order for a virus to infect your computer, you
have to run the infected program, which in turn
causes the virus code to be executed.
Virus

• How do computer viruses spread?


• Email and text message attachments
• Internet file downloads
• Social media links
• Mobile devices and smart phones can become
infected with mobile viruses through shady App
downloads.
• As attachments of socially shareable content
such as funny images, greeting cards, or audio
and video files.
• Visiting unknown links
Virus

Possible effects of virus attack on a computer


• Delete data
• Overwrite information
• Display messages
• Add itself to other files on the computer
• Stealing passwords or data
• Logging keystrokes
• Corrupting files
• Spamming email contacts
• Even taking over the machine
Virus

Possible effects of virus attack on a computer


• Delete data
• Overwrite information
• Display messages
• Add itself to other files on the computer
• Stealing passwords or data
• Logging keystrokes
• Corrupting files
• Spamming email contacts
• Even taking over the machine
Antivirus

• Anti-virus software is a program or set of


programs that are designed to prevent, search
for, detect, and remove software viruses.
• There are several different companies that
build and offer antivirus software and what
each offers can vary but all perform some
basic functions i.e., McAfee, Bitdefender,
Norton and AVG etc:
• Scan specific files or directories for any
malware or known malicious patterns.
Antivirus
• Allow you to schedule scans to automatically run for
you.
• Allow you to initiate a scan of a specific file or of your
computer, or of a CD or flash drive at any time.
• Remove any malicious code detected -sometimes you
will be notified of an infection and asked if you want to
clean the file, other programs will automatically do this
behind the scenes.
• Show you the 'health' of your computer
• Always be sure you have the best, up-to-date security
software installed to protect your computers, laptops,
tablets and smart phones.
Spyware
• Spyware is software that aims to gather
information about a person or organization
without their knowledge, that may send such
information to another entity without the
consumer's consent.
• "Spyware" is mostly classified into four types:
adware, system monitors, tracking cookies,
and trojans;
• Spyware that is installed for innocuous
reasons is sometimes referred to as tracking
software.
Spyware
• Spyware can collect almost any type of data,
including personal information like internet
surfing habits, user logins, and bank or credit
account information.
• Spyware can also interfere with a user's
control of a computer by installing additional
software or redirecting web browsers.
• Some spyware can change computer settings,
which can result in slow Internet connection
speeds, un-authorized changes in browser
settings, or changes to software settings.
Spyware
• If a smart phone gets infected with mobile
spyware that was sideloaded with a third party
app, the phone's camera and microphone can
be used to spy on nearby activity, record
phone calls, log browsing activity and
keystrokes, and monitor the phone owner's
location.
Spyware
How to recognize spyware
• New and/or unidentifiable icons may appear in
the task bar at the bottom of your screen.
• Searches may result in you being redirected to
a different search engine.
• Random error messages appear when you
perform operations that previously worked fine.
• But the best way to identify if you have been
infected is to use a spyware scanner, which will
be included in any spyware removal software.
Spyware
Spyware Prevention

• Install a security program that lets you know


when any program is being installed, so that
you can choose to authorize or stop the
installation.
Firewall
• In computing, a firewall is a network security
system that monitors and controls the incoming
and outgoing network traffic based on
predetermined security rules.
• A firewall acts as a barrier between a trusted
network and non-trusted network.
• This means that the only traffic allowed onto
the network is defined in the firewall policy; all
other traffic is denied.
Measures to keep your system and
data safe
• Computer Application White listening - The idea is
to install just a restricted number of applications in your
computers, which are useful as well as are genuine.
• Computer System Restore Solution - In case your
computer is hacked and your files are damaged, you
should have the possibility to again have access to
your files. An example is Windows System Restore or
Backup.
• Computer and Network Authentication - The data
that is accessed over the network is best to be
provided only to the authorized users. Use usernames
and passwords!!!
Measures to keep your system and
data safe
• Update Your Software. Keep your software -
including your operating system, the web
browsers you use to connect to the Internet,
and your apps - up to date to protect against
the latest threats.
• Outdated software is easier for criminals to
break into. If you think you have a virus or bad
software on your computer, check out how to
detect and get rid of malware.
Measures to keep your system and
data safe
• Protect Your Personal Information. Don't hand
it out to just anyone. Your Social Security
number, credit card numbers, and bank and
utility account numbers can be used to steal
your money or open new accounts in your
name. So every time you are asked for your
personal information - whether in a web form,
an email, a text, or a phone message - think
about why someone needs it and whether you
can really trust the request.
Measures to keep your system and
data safe
• Protect Your Personal Information. Don't hand
it out to just anyone. Your Social Security
number, credit card numbers, and bank and
utility account numbers can be used to steal
your money or open new accounts in your
name. So every time you are asked for your
personal information - whether in a web form,
an email, a text, or a phone message - think
about why someone needs it and whether you
can really trust the request.
Measures to keep your system and
data safe
• Give Personal Information Over Encrypted
Websites Only. If you're shopping or banking
online, stick to sites that use encryption to
protect your information as it travels from your
computer to their server. To determine if a
website is encrypted, look for https at the
beginning of the web address. That means the
site is secure.
• Back Up Your Files. No system is completely
secure. Copy your files to an external hard drive
or cloud storage. If your computer is attacked by
malware, you'll still have access to your files.
Thanks

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy