Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

Computer Security 101 by Montaigne

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Wird geladen in …3
×

Hier ansehen

1 von 18 Anzeige

Computer Security 101 by Montaigne

Herunterladen, um offline zu lesen

Everyday Computers become faster and more advanced! 🖥️👩‍💻 Almost everything from banking 🏧 to dating ❤️ is now done online. Exciting Times!
On #WorldComputerSecurityDay . Heres a quick "Intro to Computer Security" and tips to keep your business safe from threats and malware.

#computer #cybersecurity #startup #entrepreneur #students #computersecurity #business #ransomware #fraud #virus #malware #security

Everyday Computers become faster and more advanced! 🖥️👩‍💻 Almost everything from banking 🏧 to dating ❤️ is now done online. Exciting Times!
On #WorldComputerSecurityDay . Heres a quick "Intro to Computer Security" and tips to keep your business safe from threats and malware.

#computer #cybersecurity #startup #entrepreneur #students #computersecurity #business #ransomware #fraud #virus #malware #security

Anzeige
Anzeige

Weitere Verwandte Inhalte

Aktuellste (20)

Anzeige

Computer Security 101 by Montaigne

  1. 1. COMPUTER SECURITY 11:11PM MAKE OR BREAK YOUR TECH START UP
  2. 2. COMPUTER SECURITY Back to Agenda Page Refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues.
  3. 3. Securing our computers, electronic devices, networks , programs and systems from cyber attacks. Cyber attacks are those attacks that happen when our system is connected to the Internet. 4 TYPES OF COMPUTER SECURITY Protection of the networking infrastructure from unauthorized access, misuse, or theft. It involves creating a secure infrastructure for devices, applications and users, to work in a secure manner. Securing applications and data so that they don’t get hacked and databases of the applications remain safe and private, so that user’s data remains confidential. Protecting our system’s information from theft, illegal use and piracy. It has three objectives: confidentiality, integrity, and availability of information. CYBER SECURITY INFORMATION SECURITY APPLICATION SECURITY NETWORK SECURITY
  4. 4. TYPES OF COMPUTER SECURITY THREATS Back to Agenda Page
  5. 5. DOS A "Denial of Service" attack occurs when the attackers disrupt the services of the particular network by sending infinite requests and temporary or permanently making the network or machine resources unavailable to the intended audience.
  6. 6. BACKDOOR In a backdoor attack, malware or virus gets installed in our system and starts affecting it’s security along with the main file. For example: Installing software from the Internet and unknowingly, along with this software, a malicious file also gets installed. On execution of the installed software, that file’s malware starts affecting your computer security.
  7. 7. EAVESDROPPING Eavesdropping is the act of listening to a private computer communication, typically between hosts on a network. Programs such as Carnivore and NarusInSight have been used by the FBI and NSA to eavesdrop on the systems of ISPs. Even machines that operate as a closed systems can be eavesdropped upon by monitoring the faint electromagnetic transmissions generated by the hardware. TEMPEST is a specification by the NSA referring to these attacks.
  8. 8. PHISHING While fishing, we catch fish by luring them with bait. Similarly, in phishing, a user is tricked by the attacker or fake website who gains the trust of the user and steals information such as login details, bank details, card number etc. Phishing can be of different types such as voice phishing, text phishing etc.
  9. 9. SPOOFING Spoofing is the act of masquerading as a valid entity through falsification of data (such as an IP address or username), in order to gain access to information or resources that one is otherwise unauthorized to obtain. Spoofing is of several types- email spoofing, IP address spoofing, MAC spoofing , biometric spoofing etc.
  10. 10. MALWARE Malware is made up of two terms: Malicious + Software = Malware. Malware intrudes the system and is designed to damage our computers. Different types of malware are adware, spyware, ransomware, Trojan horse, etc.
  11. 11. SOCIAL ENGINEERING Social engineering attack involves manipulating users psychologically and extracting confidential or sensitive data from them by gaining their trust. The attacker generally exploits the trust of people or users by relying on their cognitive basis.
  12. 12. POLYMORPHIC ATTACKS Poly means “many” and morph means “form”; polymorphic attacks are those in which attacker adopts multiple forms and changes them so that they are not recognized easily. These kinds of attacks are difficult to detect due to their changing forms.
  13. 13. Train members of your organization on known threats. Work with organizations that prioritize security. Physical security. Centralized control to grant and revoke permission. Role based access. Encourage password etiquette: Use strong passwords, set up 2FA STEPS TO ENSURE COMPUTER SECURITY EMPLOYEES
  14. 14. Mask private information Use appropriate guidelines while storing and transmitting data Delete personal information that is not required STEPS TO ENSURE COMPUTER SECURITY CUSTOMER INFORMATION
  15. 15. Email security: Spam protection, malware protection Encrypt data storage Block potentially malicious websites Anti malware, AntiVirus Suite Devices that are connected to your organization network are classified as endpoints. Endpoint security includes: STEPS TO ENSURE COMPUTER SECURITY ENDPOINT SECURITY
  16. 16. Use automated software to push patches to devices Managed IT procurement if possible Use licensed software only STEPS TO ENSURE COMPUTER SECURITY USE SECURE AND UPDATED SOFTWARE
  17. 17. Regularly backup important data Setup centralized backups STEPS TO ENSURE COMPUTER SECURITY SETUP DATA RECOVERY
  18. 18. Innovate Today, Inspire Tomorrow

Ă—