1 / 8

Security & Reliability

Explore the concept of security in computer systems, the various threats they face, and effective techniques and tools to protect against hacking. Learn about system hacking, scanning, network hacking, and more. Stay secure and reliable in the digital world.

annieb
Download Presentation

Security & Reliability

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security & Reliability

  2. What is security? • Security • protection of a person, building, organization or country against threats such as crime or attacks by foreign countries [ from cambridge international dic.] • Security in CSE field?

  3. What are threats in a computer system? • System Hacking • Scanning • Gaining access • Escalating privilege • Pilfering • Covering tracks • Creating back doors • Denial of service • Password Cracking • Network Hacking • Spoofing • Session hijacking • Sniffing • Man-in-the-Middle • Exploring back doors • Scanning through firewalls • Denial of service

  4. What are threats in a computer system? • Threats • Erase hard disk completely • Store illegal or espionage material • Access confidential information • Broadcast your confidential letters or materials • Upload kitty porn and then call local authorities • Send nasty material to other people. • Threaten someone from YOUR computer • In short, make your life a living hell

  5. Example

  6. Anti-Hacking Techniques & Tools • Tips to Protect Yourself • Use difficult-to-guess passwds, community names • Limit FTP usage • Log everything • Have backups • Don't put data where unnecessary • Stay current with patches • Use a secure module (cryptography)

  7. Anti-Hacking Techniques & Tools • Tools to defend against hackers • Firewalls • Application Gateways, • Packet Filtering • Hybrid Systems • Intrusion Detection Systems • Patches for known vulnerabilities • Integrity Checker( Tripwire )

  8. Schedule • How to use security tools( 2nd day ) • Packet sniffer • Intrusion Detection System (snort) • Firewall • Cryptography( 3rd day )

More Related