computer securety
TRANSCRIPT
COMPUTER SECURITY & SAFETY ETHICS & PRIVACY
Bangladesh University Of Business & Technology
Faculty Of Bachelor Of Business Administration
Group name: Firewall
Presented By: Samia NizameID NO:14152101343 Marjana Ahmed ID NO: 14152101341
Presentation Outline Computer Security
Risk Computer Crime 7basic categories of
cyber crime Computer Viruses Computer Worms Trojan Horses Rootkit Symptoms Safeguards
DoS attack Back Doors Spoofing Firewalls References
Computer Security Risks
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability
1
Computer CrimeAn intentional breach of computer security
often involves a deliberate act that is against the law
Any illegal act involving a computer generally is referred to as a computer crime
2
7basic categories of cyber crime (1/2)
Hacker groups: Usually work anonymously and create tools for hacking.
Cracker: Someone who accesses a computer or network illegally but has the intent of destroying data, information or other malicious action
Script Kiddie: A wannabe hacker, Someone who wants to be a hacker but lacks any serious technical expertise
Cyber Terrorist: Someone who uses the internet or network to destroy or damage computers for political reasons
3
7basic categories of cyber crime (2/2) Corporate Spies: Some corporate spies have
excellent computer & networking skills & are hired to break into specific computer & steal its proprietary data & information
Unethical Employees: They break into their employers’ computers for a variety of reasons
Cyber extortionist: Someone who uses e-mail as a vehicle for extortion
4
Computer Viruses Is a small program that affects or infects, a computer
negatively by altering the way the computer works without the users knowledge
It can damage files & system software including the operating system
Viruses name: Macro Virus, Boot Virus, Network Virus, FAT Virus, Logic Bombs
5
Computer Worms It is a program that copies itself
repeatedly, for example in memory or on a network, using up resources & possibly shutting down the computer or network
6
Trojan Horses
A trojan horse named after the Greek myth is a program that hides within or looks like a legitimate program
A trojan horse does not replicate itself to other computers 7
Rootkit It is a program that
hides in computer & allows someone from a remote location to take full control of the computer
8
Once the rootkit its installed, the rootkit author can execute programs, change settings, monitor activity, and access files on the remote computer
Symptoms (1/2) Operating system runs much slower
than usual Available memory is less than
expected Files become corrupted Screen display unusual message or
image Music or unusual sound plays
randomly9
Symptoms (2/2) Unknown programs or files
mysteriously appear Existing programs & files disappear System properties change Operating system does not start up Operating system shuts down
unexpectedly
10
Safeguards against computer viruses & other Malware (1/2) Never start a computer with removable media
inserted in the drives of plugged in the ports, unless the media are uninfected
Never open an e-mail attachment unless you are expecting it & is from a trusted source
Set the macro security in program so that you can enable or disable macros
Install an antivirus program on all of your computers
11
Scan all downloaded programs for viruses & other malware If the antivirus program flags an e-mail attachment as infected, delete or quarantine the attachment immediatelyBefore using any removable media, scan the media for malware Install a personal firewall program Stay informed about new virus alerts & virus hoaxes
Safeguards against computer viruses & other Malware (2/2)
12
DoS attackA denial of service attack or
DOS attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail
For example, they may use an unsuspecting computer to send an influx of confusing data messages or useless traffic to a computer network
13
Back DoorsA back door is a program or set of instructions
in a program that allow users to bypass security controls when accessing a program, computer or network
Which allows them to continue to access the computer remotely without the user’s knowledge
14
SpoofingIn the context of network security, a
spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage
Example: E-mail spoofing IP address spoofing
15
Firewalls
A firewall is hardware & software that protects a network’s resources from intrusion by users on another network such as the Internet
All networked & online computer users should implement a firewall solution
16
References: 1. Discovering Computer
Fundamentals:2014 (writter:Shelly)
2. https://en.wikipedia.org/wiki/Spoofing_attack
3. http://files- recovery.blogspot.com/2010/06/20-common-types-of-computer-viruses-and.html 17