2. โขLoss or damage to computer hardware
โขSoftware
โขData
โข Information
Some breaches to computer security are accidental, but
some are planned. Any illegal act involving a computer is
generally referred to as a computer crime.
RISKS OF COMPUTER SECURITY
2Jatins
3. Information systems security is INFOSEC, refers to the
processes and methodologies involved with keeping :
โขInformation confidential
โขAvailable
โขAssuring its integrity
It also refers to: Access controls, which prevent unauthorized
personnel from entering or accessing a system.
SECURITY SYSTEM
3Jatins
4. CYBER TECHNOLOGY
4
Field of technology that deals with the development of:
โขArtificial devices
โขMachines
โขTechniques
โขIntelligence
โขComponents
Jatins
6. Virus protection software is designed to prevent
viruses, worms and Trojan horses from getting onto a
computer as well as remove any malicious software
code that has already infected computer.
COMPUTER PROTECTION
6Jatins
7. Governments, military, corporations, financial institutions, hospitals
and other businesses collect, process and store a great deal of
confidential information on computers and transmit that data
across networks to other computers. With the growing volume and
sophistication of cyber attacks, ongoing attention is required to
protect sensitive business and personal information, as well as
safeguard national security.
7Jatins
8. AREAS OF CYBER SECURITY
8
Data in a database or on the file system
or a system resource
unauthorized access, use, disclosure, disruption,
modification, or destruction in order to provide
confidentiality, integrity, and availability
Disaster recovery is the area of security planning
that deals with protecting an organization from
the effects of significant negative events.
policies and practices adopted to prevent and
monitor unauthorized access, misuse,
modification, or denial of a computer network
and network-accessible resources.
Application Security
Information Security
Disaster recovery
Network Security
Jatins
10. 10
SECURE COMPUTER FROM ONLINE
THREATS WHILE SURFING INTERNET
1. Enable windows automatic updates feature
2. Install antivirus software
3. Activate windows firewall
4. Enable pop up blocker of your browser
5. Clean cookies and session data after using internet
6. Be aware from email spam
7. Be aware from phishing and internet frauds
Jatins
12. COMPUTER SECURITY - THREATS
โข Intrusions
โ Any attempt to gain unauthorized access to a system
โ Cracking
โ Hacking
โ Social Engineering
โ War-driving
13. WHAT IS CYBERCRIME?
โข Using the Internet to commit a crime.
โ Identity Theft
โ Hacking
โ Virus
โข Facilitation of traditional criminal activity
โ Stalking
โ Stealing information
โ Child Pornography
15. COMPUTER SECURITY - TERMINOLOGY
โข Script Kiddies
โ Someone that calls themselves a โhackerโ but really
isnโt
โข Ethical Hacker
โ Someone hired to hack a system to find vulnerabilities
and report on them.
โ Also called a โsneakerโ