2. •Loss or damage to computer hardware
•Software
•Data
• Information
Some breaches to computer security are accidental, but
some are planned. Any illegal act involving a computer is
generally referred to as a computer crime.
RISKS OF COMPUTER SECURITY
2Jatins
3. Information systems security is INFOSEC, refers to the
processes and methodologies involved with keeping :
•Information confidential
•Available
•Assuring its integrity
It also refers to: Access controls, which prevent unauthorized
personnel from entering or accessing a system.
SECURITY SYSTEM
3Jatins
4. CYBER TECHNOLOGY
4
Field of technology that deals with the development of:
•Artificial devices
•Machines
•Techniques
•Intelligence
•Components
Jatins
6. Virus protection software is designed to prevent
viruses, worms and Trojan horses from getting onto a
computer as well as remove any malicious software
code that has already infected computer.
COMPUTER PROTECTION
6Jatins
7. Governments, military, corporations, financial institutions, hospitals
and other businesses collect, process and store a great deal of
confidential information on computers and transmit that data
across networks to other computers. With the growing volume and
sophistication of cyber attacks, ongoing attention is required to
protect sensitive business and personal information, as well as
safeguard national security.
7Jatins
8. AREAS OF CYBER SECURITY
8
Data in a database or on the file system
or a system resource
unauthorized access, use, disclosure, disruption,
modification, or destruction in order to provide
confidentiality, integrity, and availability
Disaster recovery is the area of security planning
that deals with protecting an organization from
the effects of significant negative events.
policies and practices adopted to prevent and
monitor unauthorized access, misuse,
modification, or denial of a computer network
and network-accessible resources.
Application Security
Information Security
Disaster recovery
Network Security
Jatins
10. 10
SECURE COMPUTER FROM ONLINE
THREATS WHILE SURFING INTERNET
1. Enable windows automatic updates feature
2. Install antivirus software
3. Activate windows firewall
4. Enable pop up blocker of your browser
5. Clean cookies and session data after using internet
6. Be aware from email spam
7. Be aware from phishing and internet frauds
Jatins
12. COMPUTER SECURITY - THREATS
• Intrusions
– Any attempt to gain unauthorized access to a system
– Cracking
– Hacking
– Social Engineering
– War-driving
13. WHAT IS CYBERCRIME?
• Using the Internet to commit a crime.
– Identity Theft
– Hacking
– Virus
• Facilitation of traditional criminal activity
– Stalking
– Stealing information
– Child Pornography
15. COMPUTER SECURITY - TERMINOLOGY
• Script Kiddies
– Someone that calls themselves a ‘hacker’ but really
isn’t
• Ethical Hacker
– Someone hired to hack a system to find vulnerabilities
and report on them.
– Also called a ‘sneaker’