SlideShare ist ein Scribd-Unternehmen logo
1 von 8
COMPUTER SECURITY
Ángela Aparicio4ÂșA
Definition of computer security:
The protection of computer systems and information from harm, theft,
and unauthorized use. Computer hardware is typically protected by the
same means used to protect other valuable or sensitive equipment,
namely, serial numbers, doors and locks, and alarms. The protection of
information and system access, on the other hand, is achieved through
other tactics, some of them quite complex.
Types of coputer security:
There are essentially two major types of computer security , software and
hardware security ,with a number of other categories within them.
Hardware security:
Hardware security refers to practices regarding how physical devices and
computer hardware are handled and overseen. The physical server main
frames that often house various networks and Internet websites can be
damaged, resulting in loss of data, or they could be physically attacked in
an effort to steal information directly from the system through data
transfer between devices.
Many companies and individuals should also be aware of considerations
regarding different types of computer security and physical theft. As
computer technology improves, memory and data storage devices have
become increasingly smaller. This means that someone can steal a single
computer tower or laptop from a business or a person’s home and
potentially obtain vast amounts of data and information that may be
private. Small data storage devices, such as thumb drives, should also be
protected, as someone may carelessly forget such a device at a public
computer terminal and create a very real opportunity for data loss.
2
Software security:
Software security usually consists of server protection and security,
system security from viruses and other malicious software programs, and
data security through theft prevention and safe computer practices.
Hardware security usually consists of physical devices, including server
main frames, computers, and external or portable memory and storage
devices.
Most types of computer security practices or considerations can easily be
viewed as either regarding software or hardware security. Software
security refers to ways in which attacks can be launched on data streams
and software, without physical interaction of different devices or
hardware. One of the most important security measures for many
businesses is network and server security. This usually refers to the ways
in which a business protects and secures its networks and any Internet
services it may offer, including commercial sites and private data storage.
Other security concerns involving software include issues with malicious
programs, such as viruses or spyware. These programs can get onto a
system and remain unseen, causing damage to data, providing intruders
with access to remote systems, and otherwise creating problems for
businesses and private individuals. Data theft is also a serious security
consideration for many companies and individuals, as this can result in
loss of information that can be used for identity theft and the
compromise of corporate secrets or private information.
Malwares:
Malware is a portmanteau, a term combining
"malicious" and "software" to describe a type of
program designed to steal information from or
cause damage to a computer. It includes things
like spyware and adware programs, including
pop-ups and even tracking cookies, which are
used to monitor users' surfing habits without
permission. It also includes more sinister hazards, such as
keyloggers, Trojan horses, worms, and viruses. In simpler terms,
it is any software that is intended by the developer to cause
3
harm or exploit people's computers or private records without
consent.
Types of Malwares:
Worms:
Worms spread through computers by exploiting vulnerabilities and can do so
undetected. They do not change the computer or network they pass
through, but can encrypt files ands send e-mails from the host computers
according to PC Magazine. Worm infected computers are commonly used to
send spam and junk e-mail to other users while keeping the hacker's website
hidden. A worm can copy itself and quickly spread over the Internet to
systems that are usable.
Trojans:
A Trojan, also referred to as a Trojan horse, is a form of malware that
disguises itself by appearing to perform a desirable function, but allows
unauthorized computer access instead. Trojans were created to allow
hackers remote access of a user's computer to perform operations like data
theft, software installation and file downloading. According to Symantec,
Trojans are not a self replicating form of malware and can only spread if they
are downloaded from sources like e-mail attachments and program
installations.
Spyware:
This type of malware is used to collect information about users without their
knowledge. Spyware can monitor what websites a user visits and use it for
commercial gain by delivering annoying pop-ups and rerouting web
browsing to advertisement sites. Users are often tricked into installing
Spyware the same way that Trojans are downloaded. Spyware can also add
new toolbars to a web browser and change its home page.
Adware:
Adware is a type of malware that downloads and frequently displays
advertisements onto a computer after infected software is installed. It is
usually bundled and downloaded with software like WeatherBug and Smiley
Central. According to McAfee, adware earns revenue for its vendor and can
4
slow down a computer's speed. It does not steal personal information, but is
an annoyance when trying to do simple tasks like surfing the web.
Crimeware:
Crimeware is designed to help hackers steal money from bank accounts,
transfer sensitive data and commit identity theft. The sole purpose of
crimeware is to facilitate cybercrimes through an infected computer.
Crimeware is spread through peer-to-peer file sharing and web application
vulnerabilities. The New York Times reports that this form of computer
malware will use keystroke loggers, bots and a wide range of malicious
software to commit criminal acts.
Anti-malwares:
Anti-malware resources are comprehensive solutions that maintain
computer security and protect sensitive data that is transmitted by
a network or stored on local devices. Anti-malware tools often
include multiple components, including anti-spyware and phishing
tools, as well as antivirus solutions for prominent viruses, which are
isolated and identified by security resources.
Anti-malware tools may employ scanning, strategies, freeware or
licensed tools to detect rootkits, worms, Trojans and other types of
potentially damaging software. Each type of malware resource
carries its own interface and system requirements, which impact
user solutions for a given device or system.
Encryption types:
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II
(WPA2) are two security protocols and security certification
programs developed by the Wi-Fi Alliance to secure wireless
computer networks. The Alliance defined these in response to
serious weaknesses researchers had found in the previous system,
WEP (Wired Equivalent Privacy).
5
WPA became available in 2003. The Wi-Fi Alliance intended it as an
intermediate measure in anticipation of the availability of the more
secure and complex WPA2. WPA2 became available in 2004 .
Dangers of wifi connections:
If you connect to your Wi-Fi network open, you're exposing your
connection to possible hackers, these hackers can steal passwords for
accounts on social networks, or even your bank account, they can steal
information from your computer,and you can avoid it if you only connect
to secures Wi-Fi.
E-Commerce:
Electronic commerce, commonly known as E-commerce or eCommerce,
is trading in products or services conducted via computer networks such
as the Internet. Electronic commerce draws on technologies such as
mobile commerce, electronic funds transfer, supply chain management,
Internet marketing, online transaction processing, electronic data
interchange , inventory management systems, and automated data
collection systems. Modern electronic commerce typically uses the World
Wide Web at least at one point in the transaction's life-cycle, although it
may encompass a wider range of technologies such as e-mail, mobile
devices, social media, and telephones as well.
Electronic commerce is generally considered to be the sales aspect of e-
business. It also consists of the exchange of data to facilitate the financing
and payment aspects of business transactions. This is an effective and
efficient way of communicating within an organization and one of the
most effective and useful ways of conducting business. It is a Market
entry strategy where the company may or may not have a physical
presence.
E-commerce can be divided into 7 subsections:
-E-tailing or "virtual storefronts" on websites with online catalogs,
sometimes gathered into a "virtual mall"
-Buying or selling on websites and/or online marketplaces
-The gathering and use of demographic data through web contacts and
social media
6
-Electronic data interchange, the business-to-business exchange of data
-E-mail and fax and their use as media for reaching prospective and
established customers (for example, with newsletters)
-Business-to-business buying and selling
-The security of business transactions
Service management
Service management is integrated into supply chain
management as the intersection between the actual sales and
the customer. The aim of high performance service
management is to optimize the service-intensive supply chains,
which are usually more complex than the typical finished-goods
supply chain. Most service-intensive supply chains require larger
inventories and tighter integration with field service and third
parties. They also must accommodate inconsistent and
uncertain demand by establishing more advanced information
and product flows. Moreover, all processes must be coordinated
across numerous service locations with large numbers of parts
and multiple levels in the supply chain.
Among typical manufacturers, post-sale services (maintenance,
repair and parts) comprise less than 20 percent of revenue. But
among the most innovative companies in Service, those same
activities often generate more than 50 percent of the profits.
Internet communication:
The Impact of the Internet on Communication
The internet has revolutionized all forms of communication
since the beginning of its existence. The world has now become
‘smaller' or more like a ‘global village', so to speak. The internet
was first used by the U.S military for communications purposes.
The internet, from the communication point of view, has
brought on new developments and techniques to keep in touch
not only for individuals, but for businesses as well. An example
7
of how the internet has impacted communication would be an
example of doctors now communicating through live video
feeds via the internet with patients or other doctors to diagnose
patients or to even guide and advise surgeons through
complicated procedures.
8

Weitere Àhnliche Inhalte

Was ist angesagt?

E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010Vicky Shah
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info SystemsHemant Nagwekar
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDumindu Pahalawatta
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systemsOmid Aminzadeh Gohari
 
Information security
Information securityInformation security
Information securityIshaRana14
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protectiontumetr1
 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security fieldAhmed Musaad
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threadsLeena Reddy
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-securityMarya Sholevar
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic CommerceDarlene Enderez
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsSukanya Ben
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 
Cyber security
Cyber securityCyber security
Cyber securityAkdu095
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.Ni
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMANAND MURALI
 

Was ist angesagt? (20)

E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 
Information security
Information securityInformation security
Information security
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security field
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
Presentation1
Presentation1Presentation1
Presentation1
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Cyber security
Cyber securityCyber security
Cyber security
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 

Ähnlich wie Computer Secutity.

Computer security
Computer securityComputer security
Computer securityEktaVaswani2
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptxJoselitoJMebolos
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and virusesAamlan Saswat Mishra
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxCabdullhiY
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack EssayHaley Johnson
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4Anne ndolo
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Cyber crime
Cyber crimeCyber crime
Cyber crimeSalma Zafar
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 

Ähnlich wie Computer Secutity. (20)

Computer security
Computer securityComputer security
Computer security
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Internet security
Internet securityInternet security
Internet security
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 

KĂŒrzlich hochgeladen

Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Samaira đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira đŸ€Œ  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira đŸ€Œ  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
VIP Call Girls Kolkata Ananya đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya đŸ€Œ  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya đŸ€Œ  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Russian Call Girls in Kolkata Ishita đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita đŸ€Œ  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita đŸ€Œ  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

KĂŒrzlich hochgeladen (20)

Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Samaira đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira đŸ€Œ  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira đŸ€Œ  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
VIP Call Girls Kolkata Ananya đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya đŸ€Œ  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya đŸ€Œ  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Russian Call Girls in Kolkata Ishita đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita đŸ€Œ  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita đŸ€Œ  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 đŸ«Š Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 đŸ«Š Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 đŸ«Š Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 đŸ«Š Vanshika Verma More Our Se...
 
â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
â‚č5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 

Computer Secutity.

  • 2. Ángela Aparicio4ÂșA Definition of computer security: The protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment, namely, serial numbers, doors and locks, and alarms. The protection of information and system access, on the other hand, is achieved through other tactics, some of them quite complex. Types of coputer security: There are essentially two major types of computer security , software and hardware security ,with a number of other categories within them. Hardware security: Hardware security refers to practices regarding how physical devices and computer hardware are handled and overseen. The physical server main frames that often house various networks and Internet websites can be damaged, resulting in loss of data, or they could be physically attacked in an effort to steal information directly from the system through data transfer between devices. Many companies and individuals should also be aware of considerations regarding different types of computer security and physical theft. As computer technology improves, memory and data storage devices have become increasingly smaller. This means that someone can steal a single computer tower or laptop from a business or a person’s home and potentially obtain vast amounts of data and information that may be private. Small data storage devices, such as thumb drives, should also be protected, as someone may carelessly forget such a device at a public computer terminal and create a very real opportunity for data loss. 2
  • 3. Software security: Software security usually consists of server protection and security, system security from viruses and other malicious software programs, and data security through theft prevention and safe computer practices. Hardware security usually consists of physical devices, including server main frames, computers, and external or portable memory and storage devices. Most types of computer security practices or considerations can easily be viewed as either regarding software or hardware security. Software security refers to ways in which attacks can be launched on data streams and software, without physical interaction of different devices or hardware. One of the most important security measures for many businesses is network and server security. This usually refers to the ways in which a business protects and secures its networks and any Internet services it may offer, including commercial sites and private data storage. Other security concerns involving software include issues with malicious programs, such as viruses or spyware. These programs can get onto a system and remain unseen, causing damage to data, providing intruders with access to remote systems, and otherwise creating problems for businesses and private individuals. Data theft is also a serious security consideration for many companies and individuals, as this can result in loss of information that can be used for identity theft and the compromise of corporate secrets or private information. Malwares: Malware is a portmanteau, a term combining "malicious" and "software" to describe a type of program designed to steal information from or cause damage to a computer. It includes things like spyware and adware programs, including pop-ups and even tracking cookies, which are used to monitor users' surfing habits without permission. It also includes more sinister hazards, such as keyloggers, Trojan horses, worms, and viruses. In simpler terms, it is any software that is intended by the developer to cause 3
  • 4. harm or exploit people's computers or private records without consent. Types of Malwares: Worms: Worms spread through computers by exploiting vulnerabilities and can do so undetected. They do not change the computer or network they pass through, but can encrypt files ands send e-mails from the host computers according to PC Magazine. Worm infected computers are commonly used to send spam and junk e-mail to other users while keeping the hacker's website hidden. A worm can copy itself and quickly spread over the Internet to systems that are usable. Trojans: A Trojan, also referred to as a Trojan horse, is a form of malware that disguises itself by appearing to perform a desirable function, but allows unauthorized computer access instead. Trojans were created to allow hackers remote access of a user's computer to perform operations like data theft, software installation and file downloading. According to Symantec, Trojans are not a self replicating form of malware and can only spread if they are downloaded from sources like e-mail attachments and program installations. Spyware: This type of malware is used to collect information about users without their knowledge. Spyware can monitor what websites a user visits and use it for commercial gain by delivering annoying pop-ups and rerouting web browsing to advertisement sites. Users are often tricked into installing Spyware the same way that Trojans are downloaded. Spyware can also add new toolbars to a web browser and change its home page. Adware: Adware is a type of malware that downloads and frequently displays advertisements onto a computer after infected software is installed. It is usually bundled and downloaded with software like WeatherBug and Smiley Central. According to McAfee, adware earns revenue for its vendor and can 4
  • 5. slow down a computer's speed. It does not steal personal information, but is an annoyance when trying to do simple tasks like surfing the web. Crimeware: Crimeware is designed to help hackers steal money from bank accounts, transfer sensitive data and commit identity theft. The sole purpose of crimeware is to facilitate cybercrimes through an infected computer. Crimeware is spread through peer-to-peer file sharing and web application vulnerabilities. The New York Times reports that this form of computer malware will use keystroke loggers, bots and a wide range of malicious software to commit criminal acts. Anti-malwares: Anti-malware resources are comprehensive solutions that maintain computer security and protect sensitive data that is transmitted by a network or stored on local devices. Anti-malware tools often include multiple components, including anti-spyware and phishing tools, as well as antivirus solutions for prominent viruses, which are isolated and identified by security resources. Anti-malware tools may employ scanning, strategies, freeware or licensed tools to detect rootkits, worms, Trojans and other types of potentially damaging software. Each type of malware resource carries its own interface and system requirements, which impact user solutions for a given device or system. Encryption types: Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy). 5
  • 6. WPA became available in 2003. The Wi-Fi Alliance intended it as an intermediate measure in anticipation of the availability of the more secure and complex WPA2. WPA2 became available in 2004 . Dangers of wifi connections: If you connect to your Wi-Fi network open, you're exposing your connection to possible hackers, these hackers can steal passwords for accounts on social networks, or even your bank account, they can steal information from your computer,and you can avoid it if you only connect to secures Wi-Fi. E-Commerce: Electronic commerce, commonly known as E-commerce or eCommerce, is trading in products or services conducted via computer networks such as the Internet. Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange , inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at one point in the transaction's life-cycle, although it may encompass a wider range of technologies such as e-mail, mobile devices, social media, and telephones as well. Electronic commerce is generally considered to be the sales aspect of e- business. It also consists of the exchange of data to facilitate the financing and payment aspects of business transactions. This is an effective and efficient way of communicating within an organization and one of the most effective and useful ways of conducting business. It is a Market entry strategy where the company may or may not have a physical presence. E-commerce can be divided into 7 subsections: -E-tailing or "virtual storefronts" on websites with online catalogs, sometimes gathered into a "virtual mall" -Buying or selling on websites and/or online marketplaces -The gathering and use of demographic data through web contacts and social media 6
  • 7. -Electronic data interchange, the business-to-business exchange of data -E-mail and fax and their use as media for reaching prospective and established customers (for example, with newsletters) -Business-to-business buying and selling -The security of business transactions Service management Service management is integrated into supply chain management as the intersection between the actual sales and the customer. The aim of high performance service management is to optimize the service-intensive supply chains, which are usually more complex than the typical finished-goods supply chain. Most service-intensive supply chains require larger inventories and tighter integration with field service and third parties. They also must accommodate inconsistent and uncertain demand by establishing more advanced information and product flows. Moreover, all processes must be coordinated across numerous service locations with large numbers of parts and multiple levels in the supply chain. Among typical manufacturers, post-sale services (maintenance, repair and parts) comprise less than 20 percent of revenue. But among the most innovative companies in Service, those same activities often generate more than 50 percent of the profits. Internet communication: The Impact of the Internet on Communication The internet has revolutionized all forms of communication since the beginning of its existence. The world has now become ‘smaller' or more like a ‘global village', so to speak. The internet was first used by the U.S military for communications purposes. The internet, from the communication point of view, has brought on new developments and techniques to keep in touch not only for individuals, but for businesses as well. An example 7
  • 8. of how the internet has impacted communication would be an example of doctors now communicating through live video feeds via the internet with patients or other doctors to diagnose patients or to even guide and advise surgeons through complicated procedures. 8