SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Introduction
to
Computer
security
By, P.srinu
24
COMPUTER SECURITY
Why?:to protect the computing
system and protect the data that they
store and access
 Security attacks :- actions that
comprises the computer security
 Security mechanisms:-tools such as
algorithms, protocols designed to
detect ,prevent or recover from a
security attack
 Security services :-specific kind of
protection to the system resources
SECURITY THREAT
• Threat potential violation of
security and also causes harm.
• Vulnerability a weakness that is
left unprotected.
SECURITY ATTACK
Passive attack:getting information from the
system ,but it does not affect the system.
 analyzing the traffic to find the nature of
communication
 difficult to detect as they do not involve
alteration of the data
 Hence better to Prevent rather than Detection
Active Attack: tries to alter the system
resources or affect its operations.
 Masquerade
 replay(capture events and replay)
 Modifications of messages
 Denial of services
“Difficult to prevent but can be detected and
recovered “
TARGET
users
• identity
• privacy of user
» eg.pin(personal identification number) of
atm,credit card, login id’s, pass codes
How ??
tracking of users habits and actions
What??
Cookies(cannot install malware) and spam mails are
used for attacking
Attacks on computer hardware
• Natural calamities such as Floods,
Earthquakes, power fluctuations.
• Destructive actions of burglars or people
Attacks on software
Aim?
to harm the data stored and programs in
computer
how??
Executables files:- programs written to do
harm rather than good
What??
malicious software :-a software code
included into the system which is harmful in
nature
Hacking:-intruding into another computer or
network to perform an illegal act
MALICIOUS SOFTWARE
A software program which is Destructive in nature.
Characteristics
 can attach itself to other healthy programs.
 replicates itself and thus can spread across a network
 Infects an executable file or program
 Cannot infect write protect disks , hardware,
compressed files
How dies it harm?
• Corrupt or delete data, change functionality of software ,
erase everything on the hard disk, degrade the system
performance.
What??
 E mail attachment, downloads on internet.
Eg. I love you, melissa,Brain, anna kournikova……….
VIRU
S
Java scripts ,java applets and
Activex controls
• Java applets :- it can be part of a web
page and executed by the Java
Virtual Machine executed by browsers
for many platforms, including Microsoft
Windows ,Unix, Linux etc.
• ActiveX controls:- similar to java
applets but do not have security
checks
• Java scripts:-a scripting
language commonly implemented as
part of a web browser in order to
create enhanced user interfaces and
dynamic websites
WORMS
• Self replicating software that uses network
and security holes
• it scans the network of a system and copies
itself and then starts replicating from there.
• Worm and virus are different
• Consumes the resources like bandwidth of
computer and makes it slow.
E.g. nimda(multiple infectious virus),
code red (Chinese),
TROJAN HORSE
• It is a destructive program that
masquerade as useful program.
• The reason behind the name is
the Greek soldiers who
reached the city of troy by
hiding in the wooden horse.
Similarly games, software etc.
can corrupt Data, Programs or
damage files
???queries???

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

Was ist angesagt? (20)

Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Network Security
Network SecurityNetwork Security
Network Security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 

Andere mochten auch

Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
anandraje
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
Rahulprasad Yadav
 
Network Basics & Internet
Network Basics & InternetNetwork Basics & Internet
Network Basics & Internet
VNSGU
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
Hj Habib
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 

Andere mochten auch (20)

Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Plmce mysql-101-security-basics
Plmce mysql-101-security-basicsPlmce mysql-101-security-basics
Plmce mysql-101-security-basics
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
Security Basics - Internet Safety
Security Basics - Internet SafetySecurity Basics - Internet Safety
Security Basics - Internet Safety
 
Network basics
Network basicsNetwork basics
Network basics
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Network Basics & Internet
Network Basics & InternetNetwork Basics & Internet
Network Basics & Internet
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Cryptography
CryptographyCryptography
Cryptography
 
Ms access
Ms accessMs access
Ms access
 
Ms access 2007
Ms access 2007Ms access 2007
Ms access 2007
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cryptography
CryptographyCryptography
Cryptography
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Ähnlich wie Computer security basics

Enterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurityEnterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurity
Venkat Alagarsamy
 

Ähnlich wie Computer security basics (20)

Thur Venture
Thur VentureThur Venture
Thur Venture
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Regression
RegressionRegression
Regression
 
Sangeetha Venture
Sangeetha VentureSangeetha Venture
Sangeetha Venture
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Enterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurityEnterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurity
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Malware Detection By Machine Learning Presentation.pptx
Malware Detection By Machine Learning  Presentation.pptxMalware Detection By Machine Learning  Presentation.pptx
Malware Detection By Machine Learning Presentation.pptx
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Security Architectures and Models.pptx
Security Architectures and Models.pptxSecurity Architectures and Models.pptx
Security Architectures and Models.pptx
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Security.pdf
Security.pdfSecurity.pdf
Security.pdf
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Computer security basics

  • 2. COMPUTER SECURITY Why?:to protect the computing system and protect the data that they store and access  Security attacks :- actions that comprises the computer security  Security mechanisms:-tools such as algorithms, protocols designed to detect ,prevent or recover from a security attack  Security services :-specific kind of protection to the system resources
  • 3. SECURITY THREAT • Threat potential violation of security and also causes harm. • Vulnerability a weakness that is left unprotected.
  • 4. SECURITY ATTACK Passive attack:getting information from the system ,but it does not affect the system.  analyzing the traffic to find the nature of communication  difficult to detect as they do not involve alteration of the data  Hence better to Prevent rather than Detection
  • 5. Active Attack: tries to alter the system resources or affect its operations.  Masquerade  replay(capture events and replay)  Modifications of messages  Denial of services “Difficult to prevent but can be detected and recovered “
  • 6. TARGET users • identity • privacy of user » eg.pin(personal identification number) of atm,credit card, login id’s, pass codes How ?? tracking of users habits and actions What?? Cookies(cannot install malware) and spam mails are used for attacking
  • 7.
  • 8.
  • 9. Attacks on computer hardware • Natural calamities such as Floods, Earthquakes, power fluctuations. • Destructive actions of burglars or people
  • 10. Attacks on software Aim? to harm the data stored and programs in computer how?? Executables files:- programs written to do harm rather than good What?? malicious software :-a software code included into the system which is harmful in nature Hacking:-intruding into another computer or network to perform an illegal act
  • 11. MALICIOUS SOFTWARE A software program which is Destructive in nature. Characteristics  can attach itself to other healthy programs.  replicates itself and thus can spread across a network  Infects an executable file or program  Cannot infect write protect disks , hardware, compressed files How dies it harm? • Corrupt or delete data, change functionality of software , erase everything on the hard disk, degrade the system performance. What??  E mail attachment, downloads on internet. Eg. I love you, melissa,Brain, anna kournikova………. VIRU S
  • 12.
  • 13. Java scripts ,java applets and Activex controls • Java applets :- it can be part of a web page and executed by the Java Virtual Machine executed by browsers for many platforms, including Microsoft Windows ,Unix, Linux etc. • ActiveX controls:- similar to java applets but do not have security checks • Java scripts:-a scripting language commonly implemented as part of a web browser in order to create enhanced user interfaces and dynamic websites
  • 14.
  • 15. WORMS • Self replicating software that uses network and security holes • it scans the network of a system and copies itself and then starts replicating from there. • Worm and virus are different • Consumes the resources like bandwidth of computer and makes it slow. E.g. nimda(multiple infectious virus), code red (Chinese),
  • 16. TROJAN HORSE • It is a destructive program that masquerade as useful program.
  • 17. • The reason behind the name is the Greek soldiers who reached the city of troy by hiding in the wooden horse. Similarly games, software etc. can corrupt Data, Programs or damage files
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.