computer securety

21

Upload: rushil-ahmed

Post on 12-Apr-2017

93 views

Category:

Engineering


0 download

TRANSCRIPT

Page 1: Computer securety
Page 2: Computer securety

COMPUTER SECURITY & SAFETY ETHICS & PRIVACY

Bangladesh University Of Business & Technology

Faculty Of Bachelor Of Business Administration

Group name: Firewall

Presented By: Samia NizameID NO:14152101343 Marjana Ahmed ID NO: 14152101341

Page 3: Computer securety

Presentation Outline Computer Security

Risk Computer Crime 7basic categories of

cyber crime Computer Viruses Computer Worms Trojan Horses Rootkit Symptoms Safeguards

DoS attack Back Doors Spoofing Firewalls References

Page 4: Computer securety

Computer Security Risks

A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability

1

Page 5: Computer securety

Computer CrimeAn intentional breach of computer security

often involves a deliberate act that is against the law

Any illegal act involving a computer generally is referred to as a computer crime

2

Page 6: Computer securety

7basic categories of cyber crime (1/2)

Hacker groups: Usually work anonymously and create tools for hacking.

Cracker: Someone who accesses a computer or network illegally but has the intent of destroying data, information or other malicious action

Script Kiddie: A wannabe hacker, Someone who wants to be a hacker but lacks any serious technical expertise

Cyber Terrorist: Someone who uses the internet or network to destroy or damage computers for political reasons

3

Page 7: Computer securety

7basic categories of cyber crime (2/2) Corporate Spies: Some corporate spies have

excellent computer & networking skills & are hired to break into specific computer & steal its proprietary data & information

Unethical Employees: They break into their employers’ computers for a variety of reasons

Cyber extortionist: Someone who uses e-mail as a vehicle for extortion

4

Page 8: Computer securety

Computer Viruses Is a small program that affects or infects, a computer

negatively by altering the way the computer works without the users knowledge

It can damage files & system software including the operating system

Viruses name: Macro Virus, Boot Virus, Network Virus, FAT Virus, Logic Bombs

5

Page 9: Computer securety

Computer Worms It is a program that copies itself

repeatedly, for example in memory or on a network, using up resources & possibly shutting down the computer or network

6

Page 10: Computer securety

Trojan Horses

A trojan horse named after the Greek myth is a program that hides within or looks like a legitimate program

A trojan horse does not replicate itself to other computers 7

Page 11: Computer securety

Rootkit It is a program that

hides in computer & allows someone from a remote location to take full control of the computer

8

Once the rootkit its installed, the rootkit author can execute programs, change settings, monitor activity, and access files on the remote computer

Page 12: Computer securety

Symptoms (1/2) Operating system runs much slower

than usual Available memory is less than

expected Files become corrupted Screen display unusual message or

image Music or unusual sound plays

randomly9

Page 13: Computer securety

Symptoms (2/2) Unknown programs or files

mysteriously appear Existing programs & files disappear System properties change Operating system does not start up Operating system shuts down

unexpectedly

10

Page 14: Computer securety

Safeguards against computer viruses & other Malware (1/2) Never start a computer with removable media

inserted in the drives of plugged in the ports, unless the media are uninfected

Never open an e-mail attachment unless you are expecting it & is from a trusted source

Set the macro security in program so that you can enable or disable macros

Install an antivirus program on all of your computers

11

Page 15: Computer securety

Scan all downloaded programs for viruses & other malware If the antivirus program flags an e-mail attachment as infected, delete or quarantine the attachment immediatelyBefore using any removable media, scan the media for malware Install a personal firewall program Stay informed about new virus alerts & virus hoaxes

Safeguards against computer viruses & other Malware (2/2)

12

Page 16: Computer securety

DoS attackA denial of service attack or

DOS attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail

For example, they may use an unsuspecting computer to send an influx of confusing data messages or useless traffic to a computer network

13

Page 17: Computer securety

Back DoorsA back door is a program or set of instructions

in a program that allow users to bypass security controls when accessing a program, computer or network

Which allows them to continue to access the computer remotely without the user’s knowledge

14

Page 18: Computer securety

SpoofingIn the context of network security, a

spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage

Example: E-mail spoofing IP address spoofing

15

Page 19: Computer securety

Firewalls

A firewall is hardware & software that protects a network’s resources from intrusion by users on another network such as the Internet

All networked & online computer users should implement a firewall solution

16

Page 20: Computer securety

References: 1. Discovering Computer

Fundamentals:2014 (writter:Shelly)

2. https://en.wikipedia.org/wiki/Spoofing_attack

3. http://files- recovery.blogspot.com/2010/06/20-common-types-of-computer-viruses-and.html 17

Page 21: Computer securety