KEMBAR78
Introduction of computer security | PPTX
INTRODUCTION OF COMPUTER
SECURITY
COMPUTER SECRITY
o Computer and network security was not at all well
known,even about 12 years ago
o Today ,it is something everyone is aware of the need ,but nit
sure what is really means
o Interesting topic of threads ,counter measures
risks,stories,events and paranoia
MEDIA STORIES
o Consumers are bombarded with media reports narrating
dangers of the online world
o IDENTITY THEFT
o EMBEZZIEMENT AND FRAUD
o CREDIT CARD THEFT
o CORPORATE LOSS
GOALS OF COMPUTER SECURITY
o INTEGRITY
o Guarantee that the data is what we except
o CONFIDENTIALITY
o The information must just be accessible to the
authorized people
o RELIABILITY
o Computer should work without having unexpected
problems
o AUTHENTICATION
o Guarantee that only authorized persons can access to
the resource
SECURITY BASICS
WHAT DOES IT MEANS TO BE SECURE ????
o “Include protection of information from theft or corruption
or the preservation of availability as defined in the security
policy.”
o TYPES OF SECURITY
o Network security
o System and software security
o Physical security
o Software cannot protect software (may be hardware can )
o Networks can be protected better than software
SOME OF TYPES ATTACK
SOME COMMON ATTACKS
Network attacks
o Packet sniffing man –in –the middle, DNS hacking
Web attacks
o Phishing , SQL injection ,cross site scripting
OS , Application and software attacks
o Virus , trojans , worms , rootkits , buffer overflow
Social Engineering
o (NOT social networking)
NETWORK ATTACKS
o PACKET SNIFFING
o Internet traffic consists of the data “PACKETS” an
these can be “SNIFFED”
o Leads to other attacks such as password sniffing
,cookie stealing session hijacking information
technology
o MAN IN THE MIDDLE
o Insert a router in the path between client and server
and change the packet as they pass through
o DNS HIJACKING
o Insert malicious routers in DNS tablets TO send
traffic for genuine sites to malicious sites
WEB ATTACKS
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security
Introduction of computer security

Introduction of computer security

  • 1.
  • 2.
    COMPUTER SECRITY o Computerand network security was not at all well known,even about 12 years ago o Today ,it is something everyone is aware of the need ,but nit sure what is really means o Interesting topic of threads ,counter measures risks,stories,events and paranoia
  • 3.
    MEDIA STORIES o Consumersare bombarded with media reports narrating dangers of the online world o IDENTITY THEFT o EMBEZZIEMENT AND FRAUD o CREDIT CARD THEFT o CORPORATE LOSS
  • 4.
    GOALS OF COMPUTERSECURITY o INTEGRITY o Guarantee that the data is what we except o CONFIDENTIALITY o The information must just be accessible to the authorized people o RELIABILITY o Computer should work without having unexpected problems o AUTHENTICATION o Guarantee that only authorized persons can access to the resource
  • 5.
    SECURITY BASICS WHAT DOESIT MEANS TO BE SECURE ???? o “Include protection of information from theft or corruption or the preservation of availability as defined in the security policy.” o TYPES OF SECURITY o Network security o System and software security o Physical security o Software cannot protect software (may be hardware can ) o Networks can be protected better than software
  • 6.
    SOME OF TYPESATTACK SOME COMMON ATTACKS Network attacks o Packet sniffing man –in –the middle, DNS hacking Web attacks o Phishing , SQL injection ,cross site scripting OS , Application and software attacks o Virus , trojans , worms , rootkits , buffer overflow Social Engineering o (NOT social networking)
  • 7.
    NETWORK ATTACKS o PACKETSNIFFING o Internet traffic consists of the data “PACKETS” an these can be “SNIFFED” o Leads to other attacks such as password sniffing ,cookie stealing session hijacking information technology o MAN IN THE MIDDLE o Insert a router in the path between client and server and change the packet as they pass through o DNS HIJACKING o Insert malicious routers in DNS tablets TO send traffic for genuine sites to malicious sites
  • 8.