SlideShare a Scribd company logo
1 of 28
Download to read offline
Computer Security
Threats
Quick HealTechnologies Private Limited
Topics Of Today's Discussion
Basics
Of
Computer Security
Consequences
Of
Ignoring Your
Computer Security
Threats
that can
Harm Your Computer
Computer Security
Actions
How Quick Heal
Takes Care
Of Your
Computer Security
How Do Bad Guys
Compromise Your
Computer
Security
Computer Security Basics
• What is Computer Security?
• Computer Security is the protection of computing systems and the data
that they store or access.
• Very little in computing is inherently secure, you must protect yourself!
• Software cannot protect itself
• Networks can be protected better than software
Computer Security Basics
Primary ReasonsTo SecureYour Computer
 To prevent theft of or damage to the hardware
 To prevent theft of or damage to information
 To prevent disruption of service
Photo credit: perspec_photo88 / Foter / CC BY-SA
https://www.flickr.com/photos/111692634@N04/11407095883/
Computer Security Basics
Key Areas Of Concern of Computer Security
• Confidentiality - Only authorized users can access the data resources and
information.
• Integrity - Only authorized users should be able to modify the data when needed.
• Availability - Data should be available to users when needed.
• Authentication - The computer system should be able to verify the identity of a
user.
Consequences Of Ignoring
Computer Security
Consequences Of Ignoring
Computer Security
 Loss Of Confidential Data
 Loss In Productivity
 Identity Theft
 Compromised Data Integrity
 Unavailability Of AccessTo Data Or Computer Network
 Lawsuits & Judicial Actions
 Termination Of Employment
Types Of
Computer Security
Threats
Types Of Computer SecurityThreats
Interruption
• An asset of the system becomes lost, unavailable, or unusable
• Attack on availability
• Destruction of hardware
• Cutting of a communication line
• Disabling the file management system
BA
Interruption
Types Of Computer SecurityThreats
Interception
• An unauthorized party gains access to an asset
• Attack on confidentiality
• Wiretapping to capture data in a network
• Illicit copying of files or programs
A B
C
Interception
Types Of Computer SecurityThreats
Modification
• An unauthorized party not only gains access but tampers with an asset
• Attack on integrity
• Changing values in a data file
• Altering a program so that it performs differently
• Modifying the content of messages being
transmitted in a network A B
C
Modification
Types Of Computer SecurityThreats
Fabrication
 An unauthorized party inserts counterfeit objects into the system
 Attack on authenticity
 Insertion of spurious messages in a network
 Addition of records to a file
A B
C
Fabrication
Types Of Computer SecurityThreats
Hardware
• Threats include accidental and deliberate
damage
Software
• Threats include deletion, alteration, &
damage
• Backups of the most recent versions can
maintain high availability
Photo credit: The Preiser Project / Foter / CC BY
https://www.flickr.com/photos/thepreiserproject/12102280105/
Types Of Computer SecurityThreats
Data
• Involves files
• Security concerns for availability, secrecy, and integrity
• Statistical analysis can lead to determination of individual in
formation which threatens privacy
How Do Bad Guys
CompromiseYour
Computer Security
How Do Bad Guys CompromiseYour
Computer Security
1. Social Engineering
Social engineering is a non-technical method of intrusion hackers use
that relies heavily on human interaction and often involves tricking
people into breaking normal security procedures.
Types Of Social Engineering
• Baiting
• Phishing
• Pretexting
Photo credit: Don Hankins / Foter / CC BY
https://www.flickr.com/photos/23905174@N00/1594411528/
How Do Bad Guys CompromiseYour
Computer Security
2. Reverse Social EngineeringAttack
In this kind of cyberattack, the attacker convinces a user
that they have a problem and that the attacker has a
solution to the problem.
3. Virus
Virus is a program that replicates. It spreads from file to
file on your system infecting them.
4. Worm
A worm is a standalone program that doesn’t require user
intervention to spread.Worms don’t infect existing files –
they spread copies of themselves instead.
Photo credit: Don Hankins / Foter / CC BY
https://www.flickr.com/photos/23905174@N00/1594411528/
How Do Bad Guys CompromiseYour
Computer Security
5. Trojan
Trojan horses pose as useful software, such as a legitimate
program. Instead of being well-behaved software, aTrojan opens a
backdoor on your system.
6. Ransomware
• Ransomware is a malicious program that performs the following
malicious activities after infecting a computer.
• Makes the system non-functional unless the victim agrees to pay a ransom.
• Encrypts the computer’s data and demands a ransom to release it to the
victim.
Photo credit: Don Hankins / Foter / CC BY
https://www.flickr.com/photos/23905174@N00/1594411528/
How Do Bad Guys CompromiseYour
Computer Security
7. Spyware
A common computer security threat, spyware is a class of
malicious program that secretly steals your personal
information and sends it to advertisers or hackers.
8. Rogue Antivirus
A rogue antivirus, also known as scareware, is a fake program
that disguises itself as a genuine software but performs
malicious activities in user’s machine.
Photo credit: Don Hankins / Foter / CC BY
https://www.flickr.com/photos/23905174@N00/1594411528/
How Do Bad Guys CompromiseYour
Computer Security
9.Rootkit
A rootkit is a program (or a collection of programs) that in
itself is not harmful, but helps viruses and malware hide
from antivirus software.
Photo credit: Don Hankins / Foter / CC BY
https://www.flickr.com/photos/23905174@N00/1594411528/
Top Computer Security
Actions
Top Computer Security Actions
1.Patch, Patch, Patch!
Set up your computer for automatic software and operating system updates. An
unpatched machine is more likely to have software vulnerabilities that can be exploited.
2. Install Security Software
When installed, the software should be set to scan your files and update your virus
definitions on a regular basis.
3. Choose Strong Passwords
Choose strong passwords with letters, numbers, and special characters to create a
mental image or an acronym that is easy for you to remember. Create a different
password for each important account, and change passwords regularly.
Top Computer Security Actions
4. Backup, Backup, Backup!
Backing up your machine regularly can protect you from the unexpected. Keep a few months'
worth of backups and make sure the files can be retrieved if needed.
5. Control access to your machine
Don't leave your computer in an unsecured area, or unattended and logged on, especially in
public places.The physical security of your machine is just as important as its technical
security
6. Use email and the Internet safely
Ignore unsolicited emails, and be wary of attachments, links and forms in emails that come
from people you don't know, or which seem "phishy."Avoid untrustworthy (often free)
downloads from freeware or shareware sites.
Top Computer Security Actions
7. Protect sensitive data
Reduce the risk of identity theft. Securely remove sensitive data files from your hard drive,
which is also recommended when recycling or repurposing your computer. Use the encryption
tools built into your operating system to protect sensitive files you need to retain.
8. Use desktop firewalls
Macintosh andWindows computers have basic desktop firewalls as part of their operating
systems. When set up properly, these firewalls protect your computer files from being
scanned
9. Use secure connections.
When connected to the Internet, your data can be vulnerable while in transit. Use remote
connectivity and secure file transfer options when off campus
How Quick Heal
Takes Care
Of Your
Computer Security
How Can Quick Heal Help
Thank YouCorporateCommunications@quickheal.co.in
Follow us on:
Facebook - www.facebook.com/quickhealav
Twitter - www.twitter.com/quickheal
YouTube - www.youtube.com/quickheal
SlideShare - http://www.slideshare.net/QuickHealPPTs
Website - www.quickheal.com
Official Blog - blogs.quickheal.com
References
• http://en.wikipedia.org/wiki/Computer_security
• http://its.ucsc.edu/security/training/intro.html
• http://www.technologyxperts.com/uncategorized/top-10-safe-computing-tips/
• http://blogs.quickheal.com/wp/a-laymans-glossary-of-computer-security-threats-part-1/
• http://blogs.quickheal.com/wp/common-security-threats-glossary-part-ii/

More Related Content

What's hot

What's hot (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer security
Computer securityComputer security
Computer security
 
Network security
Network securityNetwork security
Network security
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Internet security
Internet securityInternet security
Internet security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Spyware
SpywareSpyware
Spyware
 
What is malware
What is malwareWhat is malware
What is malware
 
Network security
Network securityNetwork security
Network security
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security threats
Security threatsSecurity threats
Security threats
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 

Viewers also liked

Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Think before you click
Think before you clickThink before you click
Think before you clickErkin Polat
 
Think Before You Post
Think Before You PostThink Before You Post
Think Before You Postfrostburg
 
Think before you click active Information Literacy in the classroom
Think before you click active Information Literacy in the classroomThink before you click active Information Literacy in the classroom
Think before you click active Information Literacy in the classroomAnthony Beal
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3Education
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardShafaan Khaliq Bhatti
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network securityJoe McCarthy
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 

Viewers also liked (20)

Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Think before you click
Think before you clickThink before you click
Think before you click
 
Think Before You Post
Think Before You PostThink Before You Post
Think Before You Post
 
Think before you click active Information Literacy in the classroom
Think before you click active Information Literacy in the classroomThink before you click active Information Literacy in the classroom
Think before you click active Information Literacy in the classroom
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Chapter 2 program-security
Chapter 2 program-securityChapter 2 program-security
Chapter 2 program-security
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 

Similar to Computer Security Threats

Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & ControlAdetula Bunmi
 

Similar to Computer Security Threats (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Internet
InternetInternet
Internet
 
Computer security
Computer securityComputer security
Computer security
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information security
Information securityInformation security
Information security
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 

More from Quick Heal Technologies Ltd.

31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]Quick Heal Technologies Ltd.
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Quick Heal Technologies Ltd.
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossQuick Heal Technologies Ltd.
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Quick Heal Technologies Ltd.
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationQuick Heal Technologies Ltd.
 

More from Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 

Recently uploaded

SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 

Recently uploaded (20)

SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 

Computer Security Threats

  • 2. Topics Of Today's Discussion Basics Of Computer Security Consequences Of Ignoring Your Computer Security Threats that can Harm Your Computer Computer Security Actions How Quick Heal Takes Care Of Your Computer Security How Do Bad Guys Compromise Your Computer Security
  • 3. Computer Security Basics • What is Computer Security? • Computer Security is the protection of computing systems and the data that they store or access. • Very little in computing is inherently secure, you must protect yourself! • Software cannot protect itself • Networks can be protected better than software
  • 4. Computer Security Basics Primary ReasonsTo SecureYour Computer  To prevent theft of or damage to the hardware  To prevent theft of or damage to information  To prevent disruption of service Photo credit: perspec_photo88 / Foter / CC BY-SA https://www.flickr.com/photos/111692634@N04/11407095883/
  • 5. Computer Security Basics Key Areas Of Concern of Computer Security • Confidentiality - Only authorized users can access the data resources and information. • Integrity - Only authorized users should be able to modify the data when needed. • Availability - Data should be available to users when needed. • Authentication - The computer system should be able to verify the identity of a user.
  • 7. Consequences Of Ignoring Computer Security  Loss Of Confidential Data  Loss In Productivity  Identity Theft  Compromised Data Integrity  Unavailability Of AccessTo Data Or Computer Network  Lawsuits & Judicial Actions  Termination Of Employment
  • 9. Types Of Computer SecurityThreats Interruption • An asset of the system becomes lost, unavailable, or unusable • Attack on availability • Destruction of hardware • Cutting of a communication line • Disabling the file management system BA Interruption
  • 10. Types Of Computer SecurityThreats Interception • An unauthorized party gains access to an asset • Attack on confidentiality • Wiretapping to capture data in a network • Illicit copying of files or programs A B C Interception
  • 11. Types Of Computer SecurityThreats Modification • An unauthorized party not only gains access but tampers with an asset • Attack on integrity • Changing values in a data file • Altering a program so that it performs differently • Modifying the content of messages being transmitted in a network A B C Modification
  • 12. Types Of Computer SecurityThreats Fabrication  An unauthorized party inserts counterfeit objects into the system  Attack on authenticity  Insertion of spurious messages in a network  Addition of records to a file A B C Fabrication
  • 13. Types Of Computer SecurityThreats Hardware • Threats include accidental and deliberate damage Software • Threats include deletion, alteration, & damage • Backups of the most recent versions can maintain high availability Photo credit: The Preiser Project / Foter / CC BY https://www.flickr.com/photos/thepreiserproject/12102280105/
  • 14. Types Of Computer SecurityThreats Data • Involves files • Security concerns for availability, secrecy, and integrity • Statistical analysis can lead to determination of individual in formation which threatens privacy
  • 15. How Do Bad Guys CompromiseYour Computer Security
  • 16. How Do Bad Guys CompromiseYour Computer Security 1. Social Engineering Social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. Types Of Social Engineering • Baiting • Phishing • Pretexting Photo credit: Don Hankins / Foter / CC BY https://www.flickr.com/photos/23905174@N00/1594411528/
  • 17. How Do Bad Guys CompromiseYour Computer Security 2. Reverse Social EngineeringAttack In this kind of cyberattack, the attacker convinces a user that they have a problem and that the attacker has a solution to the problem. 3. Virus Virus is a program that replicates. It spreads from file to file on your system infecting them. 4. Worm A worm is a standalone program that doesn’t require user intervention to spread.Worms don’t infect existing files – they spread copies of themselves instead. Photo credit: Don Hankins / Foter / CC BY https://www.flickr.com/photos/23905174@N00/1594411528/
  • 18. How Do Bad Guys CompromiseYour Computer Security 5. Trojan Trojan horses pose as useful software, such as a legitimate program. Instead of being well-behaved software, aTrojan opens a backdoor on your system. 6. Ransomware • Ransomware is a malicious program that performs the following malicious activities after infecting a computer. • Makes the system non-functional unless the victim agrees to pay a ransom. • Encrypts the computer’s data and demands a ransom to release it to the victim. Photo credit: Don Hankins / Foter / CC BY https://www.flickr.com/photos/23905174@N00/1594411528/
  • 19. How Do Bad Guys CompromiseYour Computer Security 7. Spyware A common computer security threat, spyware is a class of malicious program that secretly steals your personal information and sends it to advertisers or hackers. 8. Rogue Antivirus A rogue antivirus, also known as scareware, is a fake program that disguises itself as a genuine software but performs malicious activities in user’s machine. Photo credit: Don Hankins / Foter / CC BY https://www.flickr.com/photos/23905174@N00/1594411528/
  • 20. How Do Bad Guys CompromiseYour Computer Security 9.Rootkit A rootkit is a program (or a collection of programs) that in itself is not harmful, but helps viruses and malware hide from antivirus software. Photo credit: Don Hankins / Foter / CC BY https://www.flickr.com/photos/23905174@N00/1594411528/
  • 22. Top Computer Security Actions 1.Patch, Patch, Patch! Set up your computer for automatic software and operating system updates. An unpatched machine is more likely to have software vulnerabilities that can be exploited. 2. Install Security Software When installed, the software should be set to scan your files and update your virus definitions on a regular basis. 3. Choose Strong Passwords Choose strong passwords with letters, numbers, and special characters to create a mental image or an acronym that is easy for you to remember. Create a different password for each important account, and change passwords regularly.
  • 23. Top Computer Security Actions 4. Backup, Backup, Backup! Backing up your machine regularly can protect you from the unexpected. Keep a few months' worth of backups and make sure the files can be retrieved if needed. 5. Control access to your machine Don't leave your computer in an unsecured area, or unattended and logged on, especially in public places.The physical security of your machine is just as important as its technical security 6. Use email and the Internet safely Ignore unsolicited emails, and be wary of attachments, links and forms in emails that come from people you don't know, or which seem "phishy."Avoid untrustworthy (often free) downloads from freeware or shareware sites.
  • 24. Top Computer Security Actions 7. Protect sensitive data Reduce the risk of identity theft. Securely remove sensitive data files from your hard drive, which is also recommended when recycling or repurposing your computer. Use the encryption tools built into your operating system to protect sensitive files you need to retain. 8. Use desktop firewalls Macintosh andWindows computers have basic desktop firewalls as part of their operating systems. When set up properly, these firewalls protect your computer files from being scanned 9. Use secure connections. When connected to the Internet, your data can be vulnerable while in transit. Use remote connectivity and secure file transfer options when off campus
  • 25. How Quick Heal Takes Care Of Your Computer Security
  • 26. How Can Quick Heal Help
  • 27. Thank YouCorporateCommunications@quickheal.co.in Follow us on: Facebook - www.facebook.com/quickhealav Twitter - www.twitter.com/quickheal YouTube - www.youtube.com/quickheal SlideShare - http://www.slideshare.net/QuickHealPPTs Website - www.quickheal.com Official Blog - blogs.quickheal.com
  • 28. References • http://en.wikipedia.org/wiki/Computer_security • http://its.ucsc.edu/security/training/intro.html • http://www.technologyxperts.com/uncategorized/top-10-safe-computing-tips/ • http://blogs.quickheal.com/wp/a-laymans-glossary-of-computer-security-threats-part-1/ • http://blogs.quickheal.com/wp/common-security-threats-glossary-part-ii/