SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Index
Definition
Vulnerabilities
and attacks
Systems
at risk
Impact of
security
breaches
Attacker
motivation
Computer
protection
Notable
attacks and
breaches
Legal issues
and global
regulations
Job
market
Computer security, also known as cybersecurity or IT security,
is the protection of computer systems from the theft or
damage to the hardware, software or the information on them,
as well as from disruption or misdirection of the services they
provide.
A vulnerability is a system susceptibility or flaw.
TYPES:
•Backdoors
•Direct-access attacks
•Eavesdropping
•Phishing
•Clickjacking
A backdoor in a computer system, a cryptosystem or an algorithm, is
any secret method of bypassing normal authentication or security
controls. They may exist for a number of reasons, including by
original design or from poor configuration
An unauthorized user gaining physical access to a computer is
most likely able to directly copy data from it.
They may also compromise security by making operating
system modifications
Eavesdropping is the act of surreptitiously listening to a private
conversation, typically between hosts on a network
Phishing is the attempt to acquire sensitive information such as
usernames, passwords, and credit card details directly from
users. Phishing is typically carried out by email
spoofing or instant messaging
Clickjacking, also known as "UI redress attack" or "User
Interface redress attack", is a malicious technique in which an
attacker tricks a user into clicking on a button or link on
another webpage while the user intended to click on the top
level page.
Computer security is critical in
almost any industry which
uses computers. Currently,
most electronic devices such
as computers, laptops and
cellphones come with built in
firewall security software, but
despite this, computers are not
100 percent accurate and
dependable to protect our data
Serious financial damage has been
caused by security breaches, but
because there is no standard model
for estimating the cost of an incident,
the only data available is that which is
made public by the organizations
involved. "Several computer security
consulting firms produce estimates of
total worldwide losses attributable
to virus and worm attacks and to
hostile digital acts in general.
As with physical security, the motivations for breaches of
computer security vary between attackers. Some are thrill-
seekers or vandals, others are activists or criminals looking
for financial gain. State-sponsored attackers are now common
and well resourced
In computer security a countermeasure is an action, device, procedure, or
technique that reduces a threat, a vulnerability, or an attack by eliminating
or preventing it, by minimizing the harm it can cause, or by discovering and
reporting it so that corrective action can be taken.
TYPES
• Security by design
• Security architecture
• Security measures
• Vulnerability management
• Reducing vulnerabilities
• Hardware protection mechanisms
Security by design, or alternately secure by design, means that the
software has been designed from the ground up to be secure. In this
case, security is considered as a main feature.
Some of the techniques in this approach include:
• The principle of least privilege, where each part of the system has only the
privileges that are needed for its function. That way even if
an attacker gains access to that part, they have only limited access to the
whole system.
• Automated theorem proving to prove the correctness of crucial software
subsystems.
The Open Security Architecture organization defines IT security
architecture as "the design artifacts that describe how the security
controls (security countermeasures) are positioned, and how they
relate to the overall information technology architecture. These
controls serve the purpose to maintain the system's quality
attributes: confidentiality, integrity, availability, accountability
and assurance services
A state of computer "security" is the conceptual ideal, attained by the use of
the three processes: threat prevention, detection, and response. These
processes are based on various policies and system components, which
include the following:
• User account access controls and cryptography can protect systems files
and data, respectively.
• Firewalls are by far the most common prevention systems from a network
security perspective as they can (if properly configured) shield access to
internal network services, and block certain kinds of attacks through packet
filtering.
Vulnerability management is the cycle of identifying, and
remediating or mitigating vulnerabilities", especially
in software and firmware. Vulnerability management is integral
to computer security and network security.
Vulnerabilities can be discovered with a vulnerability scanner,
which analyzes a computer system in search of known
vulnerabilities, such as open ports, insecure software
configuration, and susceptibility to malware
While formal verification of the correctness of computer
systems is possible, it is not yet common. Operating
systems formally verified
include seL4, and SYSGO's PikeOS but these make up a
very small percentage of the market.
Cryptography properly implemented is now virtually
impossible to directly break. Breaking them requires
some non-cryptographic input, such as a stolen key,
stolen plaintext (at either end of the transmission), or
some other extra cryptanalytic information.
• While hardware may be a source of insecurity, such as with microchip
vulnerabilities maliciously introduced during the manufacturing
process, hardware-based or assisted computer security also offers an
alternative to software-only computer security. Using devices and
methods such as dongles, trusted platform modules, intrusion-aware
cases, drive locks, disabling USB ports, and mobile-enabled access
may be considered more secure due to the physical access required in
order to be compromised.
This are classes of attacks that are powerfully dangerous for the
computer and the info inside.
TYPES:
Robert Morris and the first computer worm
Stuxnet attack
Target and Home Depot breaches
In 1988, only 60,000 computers were connected to the Internet,
and most were mainframes, minicomputers and professional
workstations. On November 2, 1988, many started to slow
down, because they were running a malicious code that
demanded processor time and that spread itself to other
computers – the first internet "computer worm".
The computer worm known as Stuxnet reportedly ruined almost
one-fifth of Iran's nuclear centrifuges by disrupting
industrial programmable logic controllers (PLCs) in a targeted
attack generally believed to have been launched by Israel and
the United States although neither has publicly acknowledged
this.
In 2013 and 2014, a Russian/Ukrainian hacking ring known as
"Rescator" broke into Target Corporation computers in 2013,
stealing roughly 40 million credit cards, and then Home
Depot computers in 2014, stealing between 53 and 56 million credit
card numbers. Warnings were delivered at both corporations, but
ignored; physical security breaches using self checkout
machines are believed to have played a large role.
Conflict of laws in cyberspace has become a major cause of concern
for computer security community. Some of the main challenges and
complaints about the antivirus industry are the lack of global web
regulations, a global base of common rules to judge, and eventually
punish, cyber crimes and cyber criminals. There is no global cyber
law and cybersecurity treaty that can be invoked for enforcing global
cybersecurity issues.
Cybersecurity is a fast-growing field of IT concerned with reducing
organizations' risk of hack or data breach. According to research from
the Enterprise Strategy Group, 46% of organizations say that they have
a "problematic shortage" of cybersecurity skills in 2016, up from 28% in
2015.Commercial, government and non-governmental organizations all
employ cybersecurity professionals:
Security analyst
Security engineer
Security administrator
Security architect
Chief Information Security Officer
Analyzes and assesses vulnerabilities in the infrastructure
(software, hardware, networks), investigates using
available tools and countermeasures to remedy the
detected vulnerabilities, and recommends solutions and
best practices
Performs security monitoring, security and data/logs
analysis, and forensic analysis, to detect security
incidents, and mounts incident response. Investigates
and utilizes new technologies and processes to enhance
security capabilities and implement improvements. May
also review code or perform other security
engineering methodologies.
Installs and manages organization-wide security systems.
May also take on some of the tasks of a security analyst
in smaller organizations.
Designs a security system or major components of a
security system, and may head a security design team
building a new security system
A high-level management position responsible for the
entire information security division/staff. The position
may include hands-on technical work
• https://es.wikipedia.org/wiki/Wikipedia:Portada
• http://www.softheap.com/secagent.html
• https://securityzap.com/cyber-security-analyst/
• http://www.cs.cornell.edu/courses/cs1130/2011sp/module1/as
signments/a1computervirus/a1computerviruses.html
BZT®

Weitere ähnliche Inhalte

Was ist angesagt?

IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)BPalmer13
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security ManagementJonathan Coleman
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoMark John Lado, MIT
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01ITNet
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Securing information system
Securing information systemSecuring information system
Securing information systemTanjim Rasul
 
Information security
Information securityInformation security
Information securityLJ PROJECTS
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 

Was ist angesagt? (20)

Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John Lado
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
Information security management
Information security managementInformation security management
Information security management
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Information security
Information securityInformation security
Information security
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
12 security policies
12 security policies12 security policies
12 security policies
 

Ähnlich wie Computing safety

Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research PaperPankaj Jha
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxJanani S
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docxjeanettehully
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docxtodd521
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policyeverestsky66
 

Ähnlich wie Computing safety (20)

Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Is4560
Is4560Is4560
Is4560
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
 

Kürzlich hochgeladen

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Kürzlich hochgeladen (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Computing safety

  • 1.
  • 2. Index Definition Vulnerabilities and attacks Systems at risk Impact of security breaches Attacker motivation Computer protection Notable attacks and breaches Legal issues and global regulations Job market
  • 3. Computer security, also known as cybersecurity or IT security, is the protection of computer systems from the theft or damage to the hardware, software or the information on them, as well as from disruption or misdirection of the services they provide.
  • 4. A vulnerability is a system susceptibility or flaw. TYPES: •Backdoors •Direct-access attacks •Eavesdropping •Phishing •Clickjacking
  • 5. A backdoor in a computer system, a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls. They may exist for a number of reasons, including by original design or from poor configuration
  • 6. An unauthorized user gaining physical access to a computer is most likely able to directly copy data from it. They may also compromise security by making operating system modifications
  • 7. Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network
  • 8. Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details directly from users. Phishing is typically carried out by email spoofing or instant messaging
  • 9. Clickjacking, also known as "UI redress attack" or "User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page.
  • 10. Computer security is critical in almost any industry which uses computers. Currently, most electronic devices such as computers, laptops and cellphones come with built in firewall security software, but despite this, computers are not 100 percent accurate and dependable to protect our data
  • 11. Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attributable to virus and worm attacks and to hostile digital acts in general.
  • 12. As with physical security, the motivations for breaches of computer security vary between attackers. Some are thrill- seekers or vandals, others are activists or criminals looking for financial gain. State-sponsored attackers are now common and well resourced
  • 13. In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken. TYPES • Security by design • Security architecture • Security measures • Vulnerability management • Reducing vulnerabilities • Hardware protection mechanisms
  • 14. Security by design, or alternately secure by design, means that the software has been designed from the ground up to be secure. In this case, security is considered as a main feature. Some of the techniques in this approach include: • The principle of least privilege, where each part of the system has only the privileges that are needed for its function. That way even if an attacker gains access to that part, they have only limited access to the whole system. • Automated theorem proving to prove the correctness of crucial software subsystems.
  • 15. The Open Security Architecture organization defines IT security architecture as "the design artifacts that describe how the security controls (security countermeasures) are positioned, and how they relate to the overall information technology architecture. These controls serve the purpose to maintain the system's quality attributes: confidentiality, integrity, availability, accountability and assurance services
  • 16. A state of computer "security" is the conceptual ideal, attained by the use of the three processes: threat prevention, detection, and response. These processes are based on various policies and system components, which include the following: • User account access controls and cryptography can protect systems files and data, respectively. • Firewalls are by far the most common prevention systems from a network security perspective as they can (if properly configured) shield access to internal network services, and block certain kinds of attacks through packet filtering.
  • 17. Vulnerability management is the cycle of identifying, and remediating or mitigating vulnerabilities", especially in software and firmware. Vulnerability management is integral to computer security and network security. Vulnerabilities can be discovered with a vulnerability scanner, which analyzes a computer system in search of known vulnerabilities, such as open ports, insecure software configuration, and susceptibility to malware
  • 18. While formal verification of the correctness of computer systems is possible, it is not yet common. Operating systems formally verified include seL4, and SYSGO's PikeOS but these make up a very small percentage of the market. Cryptography properly implemented is now virtually impossible to directly break. Breaking them requires some non-cryptographic input, such as a stolen key, stolen plaintext (at either end of the transmission), or some other extra cryptanalytic information.
  • 19. • While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, intrusion-aware cases, drive locks, disabling USB ports, and mobile-enabled access may be considered more secure due to the physical access required in order to be compromised.
  • 20. This are classes of attacks that are powerfully dangerous for the computer and the info inside. TYPES: Robert Morris and the first computer worm Stuxnet attack Target and Home Depot breaches
  • 21. In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm".
  • 22. The computer worm known as Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges by disrupting industrial programmable logic controllers (PLCs) in a targeted attack generally believed to have been launched by Israel and the United States although neither has publicly acknowledged this.
  • 23. In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role.
  • 24. Conflict of laws in cyberspace has become a major cause of concern for computer security community. Some of the main challenges and complaints about the antivirus industry are the lack of global web regulations, a global base of common rules to judge, and eventually punish, cyber crimes and cyber criminals. There is no global cyber law and cybersecurity treaty that can be invoked for enforcing global cybersecurity issues.
  • 25. Cybersecurity is a fast-growing field of IT concerned with reducing organizations' risk of hack or data breach. According to research from the Enterprise Strategy Group, 46% of organizations say that they have a "problematic shortage" of cybersecurity skills in 2016, up from 28% in 2015.Commercial, government and non-governmental organizations all employ cybersecurity professionals: Security analyst Security engineer Security administrator Security architect Chief Information Security Officer
  • 26. Analyzes and assesses vulnerabilities in the infrastructure (software, hardware, networks), investigates using available tools and countermeasures to remedy the detected vulnerabilities, and recommends solutions and best practices
  • 27. Performs security monitoring, security and data/logs analysis, and forensic analysis, to detect security incidents, and mounts incident response. Investigates and utilizes new technologies and processes to enhance security capabilities and implement improvements. May also review code or perform other security engineering methodologies.
  • 28. Installs and manages organization-wide security systems. May also take on some of the tasks of a security analyst in smaller organizations.
  • 29. Designs a security system or major components of a security system, and may head a security design team building a new security system
  • 30. A high-level management position responsible for the entire information security division/staff. The position may include hands-on technical work
  • 31. • https://es.wikipedia.org/wiki/Wikipedia:Portada • http://www.softheap.com/secagent.html • https://securityzap.com/cyber-security-analyst/ • http://www.cs.cornell.edu/courses/cs1130/2011sp/module1/as signments/a1computervirus/a1computerviruses.html
  • 32. BZT®