0% found this document useful (0 votes)
8 views34 pages

Computer Security 2020

The document outlines the nature, significance, challenges, and components of computer security, emphasizing the importance of protecting data and systems from various threats. It discusses different types of security threats such as malware, phishing, and spyware, and highlights the need for effective security measures and user awareness. Additionally, it provides recommendations for users to enhance their security practices, including the use of encryption, strong passwords, and regular updates.

Uploaded by

audrey kwari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views34 pages

Computer Security 2020

The document outlines the nature, significance, challenges, and components of computer security, emphasizing the importance of protecting data and systems from various threats. It discusses different types of security threats such as malware, phishing, and spyware, and highlights the need for effective security measures and user awareness. Additionally, it provides recommendations for users to enhance their security practices, including the use of encryption, strong passwords, and regular updates.

Uploaded by

audrey kwari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Computer security

2 Outline

 Nature of computer security


 Basic challenges
 importance of computer
security
 Security components
 Security threats and breaches
 Computer security measures
computer security
Nature of computer security

 Computer security is the protection of computers,


as well as of the data that the computers hold.
 Computer security measures can encompass
anything, from protecting computers with
passwords to setting up firewalls—it’s important to
familiarise yourself with as many different
measures as you can in order to ensure that you
give your data and your devices as much
protection as possible.
 Cybersecurity is defined as
protecting computer systems, which
communicate over
the computer networks
 Computer Security is, basically, the
preservation of computing systems
and the information that they save
and / or retrieve.
Basic challenges in computer security
 There is a natural tendency on the part of
users and system managers to perceive
little benefit from security investment
until a security failure occurs.
 Security requires regular, even constant,
monitoring, and this is difficult to be
implemented especially at individual level
Basic challenges in computer security
 Security is still too often an afterthought to be
incorporated into a system after the design is
complete rather than being an integral part of
the design process.
 Many users and even security administrators
view strong security as an impediment to
efficient and user-friendly operation of an
information system or use of information.
Significance
 Computer Security is important enough that it
should be learned by everyone. Only 10% of
security safeguards are technical—the remaining
90% depends on the user adhering to good
computing practices.
 Computer Security is important as it
enables people to perform their work and
study.
 It helps in the execution of essential
business processes, and Safeguards
confidential and sensitive information.
 Every user of a computer or mobile device
should be able to grasp how to keep their
computer, devices, and data secure.
Computer security is everyone’s
responsibility.
Why computer security is important
in higher learning institutions
 Historically, this industry is based on the free
exchange of information,
 Students and staff may have limited technical skills to
know how to stay safe online
 Online education systems
 There’s a significant change in the user population
every year due to students graduating and new
students enrolling, making it difficult to track who is
using certain resources and who has access to them.
Importance of Computer Security in Organizations
Today

 To preserve company assets – Company assets


include information kept in the in the computer
network
 To conform with governing requirements and moral
responsibilities – Each organization creates policies
and procedures which deal with the security
requirements of the organization in question.
 For competitive benefit – Financial
services and e-commerce considers
network security to be of prime
importance.
 To help curb the increasing volume and
sophistication of cyber security threats
14 Some differences between traditional
security and soft information security

 Information can be stolen - but you still have it


 Confidential information may be copied and
sold - but the theft might not be detected
 The criminals may be on the other side of the
world
15 Security Components
 Confidentiality: The assets are accessible only by
authorized parties.
 Keeping data and resources hidden
 Integrity: The assets are modified only by authorized
parties, and only in authorized ways.
 Data integrity (integrity)
 Origin integrity (authentication)
 Availability: Assets are accessible to authorized
parties.
computer security

 Enabling access to data and resources


Vulnerabilities and Attacks
 system resource vulnerabilities may
 be corrupted (loss of integrity)
 become leaky (loss of confidentiality)
 become unavailable (loss of availability)
 attacks are threats carried out and may be
 passive
 active
 insider
 outsider
17 Computing System Vulnerabilities

 Hardware vulnerabilities
 Software vulnerabilities
 Data vulnerabilities
 Human vulnerabilities

computer security
18 Software Vulnerabilities

 Destroyed (deleted) software


 Stolen (pirated) software
 Altered (but still run) software
 Eg Virus

computer security
Examples of computer system
threats
Malware:
 Hostile, intrusive, or annoying software or
program code ("malicious + "software“)
 It is code or software that is specifically
designed to damage, disrupt, steal, or in
general inflict some other "bad" or
illegitimate action on data, hosts, or
networks.
Examples of computer system
threats

Internet bot:
 also known as web robots, are automated internet
applications controlled by software agents
 These bots interact with network services intended
for people, carrying out monotonous tasks and
behaving in a humanlike manner (i.e. computer
game bot)
21

 Bots can gather information, reply to


queries, provide entertainment, and
serve commercial purposes.
 Botnet - a network of "zombie"
computers used to do automated tasks
such as spamming or reversing
spamming
computer security
Examples of computer system
threats

Adware:
 Advertising-supported software is
any software package which
automatically plays, displays, or
downloads advertising material to a
computer after the software is
installed on it or while the application
is being used.
Examples of computer system
threats
Spyware:
 A broad category of software designed to intercept
or take partial control of a computer's operation
without the informed consent of that machine's
owner or legitimate user
 In simpler terms, spyware is a type of program that
watches what users do with their computer and
then sends that information over the internet
Examples of computer system
threats
Spam:
 Spamming is the abuse of
electronic messaging systems to
send unsolicited, undesired bulk
messages
Examples of computer system
threats
Phishing:
 A criminal activity using social engineering
techniques.
 An attempt to acquire sensitive data, such as
passwords and credit card details, by
masquerading as a trustworthy person or
business in an electronic communication.
 Typically carried out using email or an instant
message
Countermeasures

 means used to deal with security attacks


 prevent
 detect
 recover
 may result in new vulnerabilities
 will have residual vulnerability
 goal is to minimize risk given constraints
27 Goals of Security
 Prevention
 Prevent attackers from violating security policy
 Detection
 Detect attackers’ violation of security policy
 Recovery
 Stop attack, assess and repair damage
 Continue to function correctly even if attack
succeeds

computer security
28 Methods of Defense

 Encryption
 Software controls
 Hardware controls
 Policies
 Physical controls

computer security
ways computer users can protect
themselves against security breaches
 Encryption: the method by which information is converted int
secret code that hides the information's true meaning
 Use strong, ambiguous passwords that can’t be easily
predicted, and keep them secret.
 Ensure that your computer, devices and applications are
updated with the latest version of the operating system
in question.
ways computer users can protect
themselves against security breaches
 Ensure that your computer is secured with up-to-date
antivirus and anti-spyware software.
 Ignore unknown or unsolicited links and attachments.
Don’t download unfamiliar files or programs onto your
computer or other devices.
cont

 Remember that data, especially passwords


transmitted through typical wireless
connections, is very easy for hackers to
capture.
32 Physical control
 Restricting physical access to
infrastructure – e.g. locking, biometrics,
smart cards, and wireless-enabled
keycards, motion detectors
 Surveillance of infrastructure
 Environmental controls – e.g. Air
conditioning, cleanliness, waterproofing
computer security
Cloud storage/back up of course
33
work
 Use cloud storage/back up for all school work
 One Drive – 5GB Free
 https://onedrive.live.com/about/en-us/
 Drop Box – 5GB Free
 https
://www.dropbox.com/help/account/create-account
 Google Drive – 15GB Free
 https://drive.google.com/
THE END

You might also like