0% found this document useful (0 votes)
9 views

Lecture 09 Security

Uploaded by

muhammadrahid780
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Lecture 09 Security

Uploaded by

muhammadrahid780
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

Introduction to Computer Security

What is Computer Security?


• Computer Security is the protection of
computing systems and the data that they
store or access.
Why is Computer Security Important?
• Computer Security allows the organization to
carry out its mission by:
– Enabling people to carry out their jobs, education,
and research
– Supporting critical business process
– Protecting personal and sensitive information
Computer Security Risk
• is any event or action that could cause a loss
of or damage to computer hardware,
software, data, information, or processing
capability.
1.Internet and network attacks
• Information transmitted over networks has a
higher degree of security risk than information
kept on an organization’s premises.
Malware
• Malware (malicious software) –
– which are program that act without a user’s
knowledge and deliberately alter the computer
operation.
– Type of malware:
• Computer viruses
• Worms
• Trojan Horses
• Root kit
• Back doors
• Spyware
Malware Symptoms
• Operating system runs much slower than
usual
• Available memory is less than expected
• Files become corrupted
• Screen displays unusual message or image
• Music or unusual sound plays randomly
• Existing programs and files disappear
• Programs or files do not work properly
• Unknown programs or files mysteriously
appear
• System properties change
• Operating system does not start up
• Operating system shuts down unexpectedly
2. Unauthorized Access and Use
• Unauthorized access
– The use of a computer or network without
permission.
• Unauthorized use
– The use of a computer or its data for unapproved
or possibly illegal activities.
3. Hardware Theft
• Hardware theft
– Is the act of stealing computer equipment.
Hardware
– The act of defacing or destroying computer
equipment.
4. Information Theft
• Occurs when someone steals personal or
confidential information.
• If stolen, the loss of information can cause as
much damage as (if not more than) hardware
or software theft.
5. System Failure
• A system failure is the prolonged malfunction
of a computer
• A variety of factors can lead to system failure,
including
– Aging hardware
– Natural disasters
– Electrical power problems
– Under voltages, and over voltages
– Errors in computer programs
The Circle of Life

Birth

Psst!
Self-protection
Pass it on

Your wish is my
Call home
command
Birth
User invites malware onto PC
• Opens infected e-mail attachment
• Surfs infected web sites
• Clicks on link in mail, tweet, text message
• Runs infected app on social networking site
• Plugs in infected USB drive
Self-protection
Malware takes steps to protect itself
• Turn off anti-virus software
• Hide clones in places that users won’t notice
• Block anti-virus sites
• Install rootkit
• Infect common programs: Internet Explorer, Windows
Explorer,
Call home
Malware calls home for guidance
• Disguises the connection as web traffic
• Has internal address book with primary and fallback
addresses
• Reports in frequently, usually several times a day
Your wish is my command
Malware gets instructions from owner
• Download more malware, change own signature
• Send PC information home
• Log and report web sites
• Monitor and steal banking credentials
• Turn on microphone or camera
• Monitor and steal network account credentials
• Whatever the bad guy wants to do
Psst! Pass it on
Malware: the gift that keeps giving
• Sends infected mail from you to addresses found on your PC
From: You@mail.sdsu.edu
To: YourBuddy@uhoh.net
Subject: Check this out!
• Infects writable files on network shares
• Installs itself on removable media
• Scans local network for vulnerable systems
• Scans Internet for vulnerable system
Grayware

• The term grayware (or greyware) refers to a


software program (small or large) that can
cause minor to moderate annoyance, or even
damage, to a computer system and its user.
• Most adware, malware, and spyware programs
can be classified as grayware.
• In general, grayware is not as destructive as
viruses, but rather are more of a irritant or
annoyance.
End

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy