1 / 26

COMPUTER SECURITY

COMPUTER SECURITY. What is Computer Security? . Computer Security is a branch of technology known as information security as applied to computers.

bandele
Download Presentation

COMPUTER SECURITY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. COMPUTER SECURITY

  2. What is Computer Security? • Computer Security is a branch of technology known as information security as applied to computers. • Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. • The objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy.

  3. improving computer security Typical approaches to improving computer security can include the following: • Physically limit access to computers to only those who will not compromise security. • Hardware mechanisms that impose rules on computer programs, thus avoiding depending on computer programs for computer security. • Operating system mechanisms that impose rules on programs to avoid trusting computer programs. • Programming strategies to make computer programs dependable and resist subversion.

  4. Computer Security Computer Security has three Layers: • Hacking • Cracking • Phreaking

  5. Hacking • Unauthorized use or attempts to circumvent or bypass the security mechanisms of an information system or network. Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. The impact of computer hacking varies from simply being simply invasive and annoying to illegal.

  6. Cracking • The act of breaking into a computer system. Software Cracking is the modification of software to remove protection methods: copy prevention, trial/demo version, serial number, hardware key, CD check or software annoyances like nag screens and adware. The most common software crack is the modification of an application's binary to cause or prevent a specific key branch in the program's execution

  7. Phreaking • The art and science of cracking the phone network.

  8. Security by design • The technologies of computer security are based on logic. There is no universal standard notion of what secure behavior is. "Security" is a concept that is unique to each situation. Security is extraneous to the function of a computer application, rather than ancillary to it, thus security necessarily imposes restrictions on the application's behavior.

  9. Security by design There are several approaches to security in computing; sometimes a combination of approaches is valid: 1. Trust all the software to abide by a security policy but the software is not trustworthy (this is computer insecurity). 2. Trust all the software to abide by a security policy and the software is validated as trustworthy (by tedious branch and path analysis for example). 3. Trust no software but enforce a security policy with mechanisms that are not trustworthy (again this is computer insecurity). 4. Trust no software but enforce a security policy with trustworthy mechanisms.

  10. 12 tips for computer security 1. Update / patch ALL your software every now and then! 2. Check / adjust ALL your settings so they are safe, since they ARENT by default! 3. Use firewall, like ZoneAlarm to control what goes in and out from your computer! 4. Use good passwords: at least 13marks long, containing both letters and numbers. Remember to change your password every few months atleast and don’t ever use the same password in two places! 5. Get a good antivirus program: NOD32, F-Secure or Norton Antivirus and keep it updated! 6. Don’t open or execute files that you are not 100% sure are absolutely safe nomatter where or how you get them.

  11. 12 tips for computer security 7. Wipe your historyfiles (like cookies, internet history and temporary files, etc.), logs and personal files, with specific wiping program (like Eraser) instead of just deleting them. 8. Use encryption to enhance your privacy! Use encrypted email (like Hushmail or Ziplip), www-surfing and encrypt sensitive files on your computer (PGP). 9. When you are finished using some internet-based service like email, sign out of it rather than just closing your browser! Also, when you leave your computer, make sure that none of such programs or connections are left open that someone could abuse. In WindowsNT/2k/XP, press Windowskey+L to lock the workstation. 10. Don’t use public computers for anything you need to type in your logins, they usually have Trojan horses that capture your passwords. 11. Make backups and store them in safe place! Easiest way to do a total-backup is to make an "Image" of your harddrive or partition and store it on safe location, but floppies will usually be just fine for storing documents, etc. 12. Install and Use a Hardware Firewall

  12. What Is Malware? • First, the word "malware" is formed from the words "malicious" and "software." Malware, then is software that performs malicious activities on a computer system, usually without the knowledge of the computer owner or user. Calling something "malware" presupposes a harmful intention on the part of the creator or sender of the software. Malware can harm individual computers, networks or servers.

  13. What Is Malware? • Second, "malware" is a broad term that includes a number of tactics used to do harm to a computer. It includes computer viruses, worms, spyware, Trojan horses, and dishonest ads. For example, there are now images in advertising (e-mails, newsletters, etc.) that are activated when the communication is opened. Embedded in the images are codes that gather information from your computer and report it back to the sender. Some service providers have now begun to block all images from e-mails.

  14. What Is Malware? • Third, "malware" is the same as a "computer contaminant“ as a phrase used in the legal codes of several states, including California. • Fourth, defective software is not malware. Although defective software can damage a computer or a network, the manufacturer's intent is not to do harm

  15. What makes a computer vulnerable to malware? • When all of the computers in a network operate on the same operating system, all of the computers in the network are vulnerable if someone breaks that system. • Bugs or errors in a system make it easier to exploit with malware. • Hidden codes from internet sites, e-mails, CDs or other disks can introduce malware without the user realizing it. • Inappropriate changes to the internal structure of the system. • Inadequate system security that allows access to unauthorized persons.

  16. The primary elements of malware protection • Keep all software current and properly patched • Update your operating system regularly • Update your anti-virus software regularly • Download files only from reliable known sources • Read all license agreements carefully before installing new software. Look for warnings about spyware. • Install and use a firewall. • Allow only the experts to modify code or make changes to the structure of the system.

  17. What Is Identity Theft? • One of the prime axioms in life is just when you think it couldn’t happen to you, it does. This is a sad fact, and even more so when you consider the crime of identity theft. You take years to establish your financial and individual identity and reputation, and in one moment the illegal act of another washes it all away wreaking havoc on your financial life. • The reasons for identity theft are as varied as the circumstances of the unsuspecting victims. There are ways to protect yourself. Being diligent and using common sense can go a long way in preventing this troublesome event from happening in your life.

  18. some steps to consider • Protecting your information Keep your social security card separate from your other identification, leaving it at home if at all possible. Have a sheet with all of your credit card numbers and companies listed and in a safe place, so in the event of theft you can call quickly to cancel the accounts. • Limit preprinted check information Checks are another potential bonanza for an identity thief. Even though it may make checking out a little harder, only put your basic information (name, address, maybe a phone number) on your checks. This will prevent an ID thief from getting your drivers license or social security number off a check left lying around.

  19. some steps to consider • Protecting your information The identity thief is not above digging in a dumpster for information that can get them something on someone else tab. Credit card and banking statements, applications for credit cards, phone bills and utility bills all need to be shredded to prevent anyone from getting your information. Checkbooks need to be treated the same to get rid of your account numbers on them. 4. Share sensitive information with care Giving information out over the phone is sometimes required for security purposes, and some companies that call you might ask you to verify personal information to make sure that they are speaking to the right person. If you are unsure of the callers identity, erring on the side of caution is advised. This can prevent inadvertent sharing of sensitive information with someone that has misrepresented their intentions or identity. Ask for a call back number and check it out if you have any doubts at all.

  20. some steps to consider 5. Avoid easily decipherable passwords When choosing a password for your sensitive accounts try to avoid any word and or number combinations that can be easily discovered. Some examples include your mothers maiden name, your house number or birth date. If possible, place security questions, to which only you know the answers on your account.

  21. These steps provide a good first line of defense against identity theft but, unfortunately, they do not provide a guarantee. If you follow steps and still become a victim of identity theft, take action fast

  22. Important actions if you are the victim of identity theft • The first step is to report it to the authorities. Most companies have to have a police report or case number before they can work with you to undo the damage. With the report or number in hand, you will need to call all of your credit card issuers and advise them of what has happened so they can flag your account with a fraud investigation flag. Utilities and phone companies must be notified as well.

  23. Important actions if you are the victim of identity theft • Be mindful that there are three credit reporting agencies that collect and compile information about your credit history and habits. You will need to inform at least one of them so that a fraud alert can be placed on your file. Once the alert is placed the first agency will inform the other two bureaus to place alerts as well. You can choose an initial if you merely suspect identity theft and adopt a wait and watch approach or an extended alert if you are certain that you have been a victim of this crime.

  24. Important actions if you are the victim of identity theft • You will also need to get a copy of your credit report and review its accuracy. Give particular attention to recent activity that does not seem familiar. Write and or call all of the companies that report information related to your identity theft. Most credit card companies will only hold their customers responsible for up to $50 dollars in cases of theft, and most banks will replace stolen money pending verification.

  25. Important actions if you are the victim of identity theft • Identity theft can make securing loans for home ownership or education impossible. It may even prevent employment with agencies that require a particular credit score. If you have been the victim of identity theft it can take weeks or years and often quite a bit of time and money to undo the damage. It makes sense that victims often feel angry, overwhelmed and discouraged. If you are the victim of identity theft its very important to be proactive. When you act quickly you will minimize the damage and loss by limiting unauthorized access to your sensitive account information

  26. Important actions if you are the victim of identity theft • Be sure to keep records of all activities and contacts related to your identity theft. You may also want to make periodic checks of your credit report and sign up for an account monitoring service, which immediately alerts you when inquiries to your credit report occur. Stay alert and keep aware

More Related