2. COMPUTER SECURITY & SAFETY
ETHICS & PRIVACY
Faculty Of Bachelor Of Business Administration
Group name: Firewall
Presented By:
Samia Nizame
ID NO:14152101343
Marjana Ahmed
ID NO: 14152101341
4. Computer Security Risks
A computer security risk is any event or action that
could cause a loss of or damage to computer
hardware, software, data, information or
processing capability
1
5. ComputerCrime
An intentional breach of computer security
often involves a deliberate act that is against
the law
Any illegal act involving a computer generally
is referred to as a computer crime
2
6. 7basic categories of cyber crime (1/2)
Hacker groups: Usually work anonymously and create tools
for hacking.
Cracker: Someone who accesses a computer or network
illegally but has the intent of destroying data, information
or other malicious action
Script Kiddie:A wannabe hacker, Someone who wants to
be a hacker but lacks any serious technical expertise
CyberTerrorist: Someone who uses the internet or network
to destroy or damage computers for political reasons
3
7. 7basic categories of cyber crime (2/2)
Corporate Spies: Some corporate spies have excellent
computer & networking skills & are hired to break into
specific computer & steal its proprietary data & information
Unethical Employees:They break into their employers’
computers for a variety of reasons
Cyber extortionist: Someone who uses e-mail as a vehicle
for extortion
4
8. Computer Viruses
Is a small program that affects or infects, a computer
negatively by altering the way the computer works
without the users knowledge
It can damage files & system software including the
operating system
Viruses name: Macro Virus, Boot Virus, Network Virus,
FAT Virus, Logic Bombs
5
9. Computer Worms
It is a program that copies itself repeatedly, for
example in memory or on a network, using up
resources & possibly shutting down the
computer or network
6
10. Trojan Horses
A trojan horse named
after the Greek myth is a
program that hides
within or looks like a
legitimate program
A trojan horse does not
replicate itself to other
computers 7
11. Rootkit
It is a program that
hides in computer &
allows someone
from a remote
location to take full
control of the
computer
8
Once the rootkit its installed, the
rootkit author can execute
programs, change settings,
monitor activity, and access files
on the remote computer
14. Safeguards against computer viruses &
other Malware (1/2)
Never start a computer with removable media inserted in
the drives of plugged in the ports, unless the media are
uninfected
Never open an e-mail attachment unless you are expecting
it & is from a trusted source
Set the macro security in program so that you can enable or
disable macros
Install an antivirus program on all of your computers
11
15. Scan all downloaded programs for viruses & other malware
If the antivirus program flags an e-mail attachment as
infected, delete or quarantine the attachment immediately
Before using any removable media, scan the media for
malware
Install a personal firewall program
Stay informed about new virus alerts & virus hoaxes
Safeguards against computer viruses &
other Malware (2/2)
12