importance of computer security software - wikki verma
TRANSCRIPT
![Page 1: Importance of Computer Security Software - Wikki Verma](https://reader031.vdocuments.us/reader031/viewer/2022030318/5a6538ae7f8b9a5b558b55ff/html5/thumbnails/1.jpg)
![Page 2: Importance of Computer Security Software - Wikki Verma](https://reader031.vdocuments.us/reader031/viewer/2022030318/5a6538ae7f8b9a5b558b55ff/html5/thumbnails/2.jpg)
Introduction The computer security is also known as cyber security
or IT security, is mainly uses for protection thecomputer system from the damages of their hardwareor software. The defenses of computers against theinstruction and unauthorized use of the resources isknown as desktop security.
![Page 3: Importance of Computer Security Software - Wikki Verma](https://reader031.vdocuments.us/reader031/viewer/2022030318/5a6538ae7f8b9a5b558b55ff/html5/thumbnails/3.jpg)
Objective of Computer Security
Confidentiality
Integrity
Availability
Authentication
![Page 4: Importance of Computer Security Software - Wikki Verma](https://reader031.vdocuments.us/reader031/viewer/2022030318/5a6538ae7f8b9a5b558b55ff/html5/thumbnails/4.jpg)
Consequence of Ignoring Computer Security
Loss of Confidential Data
Identity Theft
Compromised Data Integrity
Termination of Employment
Loss In Productivity
unavailability of Access to Data
![Page 5: Importance of Computer Security Software - Wikki Verma](https://reader031.vdocuments.us/reader031/viewer/2022030318/5a6538ae7f8b9a5b558b55ff/html5/thumbnails/5.jpg)
Types of Computer Security Threats
Interruption
Interception
Modification
Fabrication
Hardware
Software
Data
![Page 6: Importance of Computer Security Software - Wikki Verma](https://reader031.vdocuments.us/reader031/viewer/2022030318/5a6538ae7f8b9a5b558b55ff/html5/thumbnails/6.jpg)
Interruption Attack on availability
Cutting the communication line
Disabling the file management system
Destruction of hardware
The system become lost and unusable.
![Page 7: Importance of Computer Security Software - Wikki Verma](https://reader031.vdocuments.us/reader031/viewer/2022030318/5a6538ae7f8b9a5b558b55ff/html5/thumbnails/7.jpg)
Interception
Attack on confidentially
An unauthorized gains access to an assets.
Wiretapping to capture data in a network
![Page 8: Importance of Computer Security Software - Wikki Verma](https://reader031.vdocuments.us/reader031/viewer/2022030318/5a6538ae7f8b9a5b558b55ff/html5/thumbnails/8.jpg)
Modification
Changing the value in a data file.
Attack on integrity
Modifying the content of messages being transmitted in a network.
![Page 9: Importance of Computer Security Software - Wikki Verma](https://reader031.vdocuments.us/reader031/viewer/2022030318/5a6538ae7f8b9a5b558b55ff/html5/thumbnails/9.jpg)
Fabrication
Addition of record to a file.
Attack on authenticity
Insertion of a spurious messages in a network.
![Page 10: Importance of Computer Security Software - Wikki Verma](https://reader031.vdocuments.us/reader031/viewer/2022030318/5a6538ae7f8b9a5b558b55ff/html5/thumbnails/10.jpg)
Data
Involves file
Security concerns for availability, secrecy and integrity
Statistical analysis can lead to determination ofindividuals in formation which threats privacy.
![Page 11: Importance of Computer Security Software - Wikki Verma](https://reader031.vdocuments.us/reader031/viewer/2022030318/5a6538ae7f8b9a5b558b55ff/html5/thumbnails/11.jpg)
Computer Security Action
Patch, patch, patch
Install security software
Choose the strong password
Use email and the internet safety
Control access to your machine.
Protect sensitive data
Use desktop firewall
Use secure connection
Backup, backup, backup!
![Page 12: Importance of Computer Security Software - Wikki Verma](https://reader031.vdocuments.us/reader031/viewer/2022030318/5a6538ae7f8b9a5b558b55ff/html5/thumbnails/12.jpg)
For Example:
Wikki Verma is an IT software experts who willprovide the help in various services such as:interception, modification, hardware and data.
![Page 13: Importance of Computer Security Software - Wikki Verma](https://reader031.vdocuments.us/reader031/viewer/2022030318/5a6538ae7f8b9a5b558b55ff/html5/thumbnails/13.jpg)