SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Computer Security
  by Antonio González Carcavilla
What is Computer Security?
•   is a branch of computer technology

•   known as “Information Security”

•   applied to computers and networks

•   the objective is to protect information and property
    from theft, corruption, or natural disaster
Risks & Threatening


• Malware    • Social Engineering
Malware
Consists of programming designed to:

•disrupt or deny operation
•gather information that leads to loss of privacy or
exploitation

•or gain unauthorized access to system resources
Examples of Malware

    • Virus
    • Trojans
    • Bots and botnets
    • Spyware
Virus
•   programs that alter the functioning of our computer
    without our knowledge obtaining or destroying
    information

•   spread by direct contact or sharing the same medium
Trojans
•   viruses disguise as programs that supposedly do
    something but actually open a door on our
    computer so it can be accessed from outside

•   his name comes from The Trojan Horse
Bots or Robots
•   is a type of trojan that use our computer to
    connect to other infected computers (zombies)

•   the goal is create botnets or zombie networks

•   enables to send mass mailings without be detected
Spyware
•   collects small pieces of information about users
    without their knowledge

•   search for email adress, IP address, pages visited,...

•   the presence of spyware is typically hidden from
    the user, and can be difficult to detect
What is the propose?
How to get money?

• directly:          • indirectly:
  getting our bank     renting zombie networks
  access: phising      for illegal purposes
Social Engineering
• The art of manipulating people into
  performing actions or divulging confidential
  information.
Examples of Social Engineering


          • Spam
          • Hoax
          • Phising
Spam
•   is the use of electronic messaging systems to send
    unsolicited bulk messages indiscriminately

•   the most widely recognized form of spam is
    e-mail spam
Hoax
•   is a message warning the recipient of a non-existent
    computer virus threat

•   the message is usually a chain e-mail

•   are usually harmless
Phishing
•   a way of attempting to acquire information such as
    usernames, passwords, and credit card details by
    masquerading as a trustworthy entity in an electronic
    communication
HowTo defend against
        Social Engineering?

"If something seems too good to be true, it probably isn’t"


   •   don’t share relevant information

   •   ensure that access the site you want

   •   change the password regularly
Safe Passwords
There are two rules to enforce good passwords:

        •   easy to remember

        •   not a word in the dictionary
Safe Passwords
How to create passwords easy to remember


   •   find a personal “algorithm” for generating
       obscure passwords

   •   use sayings, poems or famous quotes
Safe Passwords
     Example:
             Kill Two Birds With One
             Stone 
take the first letter of each word and change the numbers in figures:

                  K___ 2 B____ W___ 1 S____

                           “k2bw1s”
Safe Passwords
Other examples:
     “2habt1”        Two Heads Are Better Than One
   “1ysm7yw”         One year's seeding makes seven years weeding
    “2icb3iac”       Two is company but three is a crowd
  “abithiw2itb”      A bird in the hand is worth two in the bush
   “str&stc”         Spare the rod and spoil the child
  “w&pup4ure”        Walnuts and Pears You Plant For Your Ears

Weitere ähnliche Inhalte

Was ist angesagt?

Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldAmae OlFato
 
Cyberspace
CyberspaceCyberspace
CyberspaceG Prachi
 
Social Engineering
Social Engineering Social Engineering
Social Engineering Mirna Hanna
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in TechnologyDigvijay Naruka
 
Cyber interaction and collaboration
Cyber interaction and collaborationCyber interaction and collaboration
Cyber interaction and collaborationalhooti11
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringPrem Lamsal
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About itAleksandr Yampolskiy
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
secureIoT Presentation #2 redo
secureIoT Presentation #2 redosecureIoT Presentation #2 redo
secureIoT Presentation #2 redoMel Savich
 

Was ist angesagt? (20)

Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Hacking
HackingHacking
Hacking
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Social Engineering
Social Engineering Social Engineering
Social Engineering
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
Cyber interaction and collaboration
Cyber interaction and collaborationCyber interaction and collaboration
Cyber interaction and collaboration
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Hacking
HackingHacking
Hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
N.vinodh
N.vinodhN.vinodh
N.vinodh
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
secureIoT Presentation #2 redo
secureIoT Presentation #2 redosecureIoT Presentation #2 redo
secureIoT Presentation #2 redo
 

Andere mochten auch

2 nd national youth media summit 2012
2 nd national youth media summit 20122 nd national youth media summit 2012
2 nd national youth media summit 2012Tee-soft
 
Steer up the giant in you presentation.
Steer up the giant in you presentation.Steer up the giant in you presentation.
Steer up the giant in you presentation.Tee-soft
 
Udit Hr Resume
Udit Hr ResumeUdit Hr Resume
Udit Hr ResumeUdit2009
 
Udit Hr Resume
Udit Hr ResumeUdit Hr Resume
Udit Hr ResumeUdit2009
 
100%chef catalogo1-web-2
100%chef catalogo1-web-2100%chef catalogo1-web-2
100%chef catalogo1-web-2nitrolabrussia
 
Wyomissing Square Project Case Study
Wyomissing Square Project Case StudyWyomissing Square Project Case Study
Wyomissing Square Project Case StudyJohn Connors JR
 

Andere mochten auch (7)

Môn tlv
Môn tlvMôn tlv
Môn tlv
 
2 nd national youth media summit 2012
2 nd national youth media summit 20122 nd national youth media summit 2012
2 nd national youth media summit 2012
 
Steer up the giant in you presentation.
Steer up the giant in you presentation.Steer up the giant in you presentation.
Steer up the giant in you presentation.
 
Udit Hr Resume
Udit Hr ResumeUdit Hr Resume
Udit Hr Resume
 
Udit Hr Resume
Udit Hr ResumeUdit Hr Resume
Udit Hr Resume
 
100%chef catalogo1-web-2
100%chef catalogo1-web-2100%chef catalogo1-web-2
100%chef catalogo1-web-2
 
Wyomissing Square Project Case Study
Wyomissing Square Project Case StudyWyomissing Square Project Case Study
Wyomissing Square Project Case Study
 

Ähnlich wie Computer Security

Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...Egyptian Engineers Association
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the InternetTseAnRS
 
Crontab Cyber Security session 4
Crontab Cyber Security session 4Crontab Cyber Security session 4
Crontab Cyber Security session 4gpioa
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimessweta dargad
 
Password protection
Password protectionPassword protection
Password protectionpost_it
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 

Ähnlich wie Computer Security (20)

Computer security
Computer securityComputer security
Computer security
 
Cyber security
Cyber securityCyber security
Cyber security
 
HACKING
HACKINGHACKING
HACKING
 
Online reputation
Online reputationOnline reputation
Online reputation
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the Internet
 
Crontab Cyber Security session 4
Crontab Cyber Security session 4Crontab Cyber Security session 4
Crontab Cyber Security session 4
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 
Password protection
Password protectionPassword protection
Password protection
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 

Kürzlich hochgeladen

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Kürzlich hochgeladen (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Computer Security

  • 1.
  • 2. Computer Security by Antonio González Carcavilla
  • 3. What is Computer Security? • is a branch of computer technology • known as “Information Security” • applied to computers and networks • the objective is to protect information and property from theft, corruption, or natural disaster
  • 4. Risks & Threatening • Malware • Social Engineering
  • 5. Malware Consists of programming designed to: •disrupt or deny operation •gather information that leads to loss of privacy or exploitation •or gain unauthorized access to system resources
  • 6. Examples of Malware • Virus • Trojans • Bots and botnets • Spyware
  • 7. Virus • programs that alter the functioning of our computer without our knowledge obtaining or destroying information • spread by direct contact or sharing the same medium
  • 8. Trojans • viruses disguise as programs that supposedly do something but actually open a door on our computer so it can be accessed from outside • his name comes from The Trojan Horse
  • 9. Bots or Robots • is a type of trojan that use our computer to connect to other infected computers (zombies) • the goal is create botnets or zombie networks • enables to send mass mailings without be detected
  • 10. Spyware • collects small pieces of information about users without their knowledge • search for email adress, IP address, pages visited,... • the presence of spyware is typically hidden from the user, and can be difficult to detect
  • 11. What is the propose?
  • 12. How to get money? • directly: • indirectly: getting our bank renting zombie networks access: phising for illegal purposes
  • 13. Social Engineering • The art of manipulating people into performing actions or divulging confidential information.
  • 14. Examples of Social Engineering • Spam • Hoax • Phising
  • 15. Spam • is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately • the most widely recognized form of spam is e-mail spam
  • 16. Hoax • is a message warning the recipient of a non-existent computer virus threat • the message is usually a chain e-mail • are usually harmless
  • 17. Phishing • a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication
  • 18. HowTo defend against Social Engineering? "If something seems too good to be true, it probably isn’t" • don’t share relevant information • ensure that access the site you want • change the password regularly
  • 19. Safe Passwords There are two rules to enforce good passwords: • easy to remember • not a word in the dictionary
  • 20. Safe Passwords How to create passwords easy to remember • find a personal “algorithm” for generating obscure passwords • use sayings, poems or famous quotes
  • 21. Safe Passwords Example: Kill Two Birds With One Stone  take the first letter of each word and change the numbers in figures: K___ 2 B____ W___ 1 S____ “k2bw1s”
  • 22. Safe Passwords Other examples:  “2habt1”  Two Heads Are Better Than One  “1ysm7yw”  One year's seeding makes seven years weeding  “2icb3iac”  Two is company but three is a crowd “abithiw2itb”   A bird in the hand is worth two in the bush “str&stc”    Spare the rod and spoil the child “w&pup4ure” Walnuts and Pears You Plant For Your Ears