1 / 38

LOADING ...

LOADING . ...Presentation Loaded. PROTECTION. COMPUTER SECURITY. A branch of information technology which deals in the protection of data on a network or a standalone desktop. COMPUTER SECURITY. Information and Data Security Network Security Computer System Security.

blaze
Download Presentation

LOADING ...

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. LOADING... ...Presentation Loaded

  2. PROTECTION COMPUTER SECURITY A branch of information technology which deals in the protection of data on a network or a standalone desktop.

  3. COMPUTER SECURITY Information and Data Security Network Security Computer System Security Protecting data and information systems from destruction or data loss.

  4. Network Security - Consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network- accessible resources. - The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

  5. Distributed Denial-of-Service • Packet Sniffing A Hacker uses a network of zombie computers to sabotage a specific Web site or server. The Hacker tells all the computers on his botnet to contact a specific server or Web site repeatedly. The sudden increase in traffic can cause the site to load very slowly for legitimate users. Sometimes the traffic is enough to shut the site down completely.

  6. Hacker Zombie Computer Zombie Computer Reflectors Target

  7. Packet Sniffing • The act of intercepting TCP/IP packets while they are getting transferred on a network. Using the information captured by the packet sniffer an administrator can identify erroneous packets and use the data to pinpoint bottlenecks and help maintain efficient network data transmission. Sniffer bottleneck Network Interface Sender Receiver

  8. GOOD BAD Used for monitoring and analyzing Network for packets that may contain errors. Used for gaining classified information such as Usernames, Passwords, documents, etc.

  9. Computer System Security -protects the machine and peripheral hardware from theft and from electronic intrusion and damage. • Unauthorized User • Fluctuations in the power supply • Static Electricity • Intrusion of tiny insects • Dust accumulation • Lack of ventilation

  10. Types of Computer Security Threats

  11. Passive threat – very difficult to detect and equally to prevent as well. • Active threat – easy to find out and fix as well.

  12. VIRUS • The most common type of cyber threats. They infect different files on the computer network or on the stand alone systems. • Viruses infect Computer by: • clicking malicious links • downloading malicious files • email attachments • infected portable data storages

  13. Worms They are actually malicious programs, which take advantage of the weaknesses in the operating system. Net Worms - These worms replicates itself by sending complete and independent copes of itself over a network, thereby infecting almost all the systems on the said network.

  14. Trojan The Trojans derive their name from the legend. They make their way into the software, which may not be noticed. It is often seen, that the Trojans are a part of the different attachments in emails or download links. In some cases making a visit to certain web pages also puts the computer system at risk.

  15. Spyware Spyware as the name suggests spy on the network and the computer system. They may be downloaded unintentionally from different websites, email messages or instant messages. In some cases, they may also make their way through different direct file sharing connection. In some cases, clicking on “accept User License Agreement”, can also put the computer at risk.

  16. Rootkits The job of the rootkits is to give cover to the hackers. The best or the worst part about rootkits is that they are able to hide themselves from the antivirus software as well, due to which the user is not aware that a rootkit is present on the system. This helps the hacker and he is able to spread malware on the system. Therefore, it is important that one opts for antivirus, which also has a rootkit scanner, which will be able to detect the invasion.

  17. Riskware They are dangerous applications, who often become a part of software applications. They are often seen as a part of development environment for malicious programs and spread to the software applications. In some cases, these applications can also be used by hackers as additional components to gain access in the network.

  18. Adware They are actually advertising supported software. It is not uncommon to see different advertisements or pop ups coming up on the computer, when certain applications are being used. They may not pose a lot of threat, but often lower the speed of the computers. There are chances that the computer system may become unstable because of these adware.

  19. Phishing Often people appear to get emails from trustworthy organizations, like banks. In some cases, the emails may come from bogus sites, which may resemble the original site or it may superimposes a bogus pop up, due to which confidential data is gathered. They are often a part of different scamming activities and often poses to the financial threats.

  20. ANTIVIRUS

  21. Antivirus or Anti-virus Software Software used to prevent, detect andremove malware(of all descriptions), such as: computer viruses, adware, backdoors, malicious BHOs, dialers, fraudtools, hijackers, keyloggers, malicious LSPs, rootkits, spyware, trojan horses and worms. No matter how useful antivirus software can be, it can sometimes have drawbacks.

  22. Inexperienced users may also have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach.

  23. IDENTIFICATION METHODS Signature based detectionis the most common method. To identify viruses and other malware, antivirus software compares the contents of a file to a dictionary of virus signatures. Heuristic-based detectionlike malicious activity detection, can be used to identify unknown viruses. File emulationis another heuristic approach. File emulation involves executing a program in a virtual environment and logging what actions the program performs.

  24. Rootkit detection Anti-virus software can attempt to scan for rootkits; a rootkit is a type of malware that is designed to gain administrative-level control over a computer system without being detected Rootkits are also difficult to remove, in some cases requiring a complete re-installation of the operating system.

  25. Real-time protection Refer to the automatic protection provided by most antivirus, anti-spyware, and other anti-malware programs. This monitors computer systems for suspicious activity such as computer viruses, spyware, adware, and other malicious objects in “real-time”, in other words while data loaded into the computer's active memory: when inserting a CD, opening an email, or browsing the web, or when a file already on the computer is opened or executed.

  26. Problems caused by False Positives A "false positive" is when antivirus software identifies a non-malicious file as a virus. When this happens, it can cause serious problems. Example: If an antivirus program is configured to immediately delete or quarantine infected files, a false positive in an essential file can render the operating system or some applications unusable.

  27. Other Methods... Installed antivirus software running on an individual computer is only one method of guarding against viruses. Other methods are also used, including cloud-based antivirus, firewalls and on-line scanners.

  28. Cloud antivirus Cloud antivirus is a technology that uses lightweight agent software on the protected computer, while offloading the majority of data analysis to the provider's infrastructure.

  29. Network firewall Network firewalls prevent unknown programs and processes from accessing the system. However, they are not antivirus systems and make no attempt to identify or remove anything. They may protect against infection from outside the protected computer or network, and limit the activity of any malicious software which is present by blocking incoming or outgoing requests on certain TCP/IP ports.

  30. Online Scanning Some antivirus vendors maintain websites with free online scanning capability of the entire computer, critical areas only, local disks, folders or files. Periodic online scanning is a good idea for those that run antivirus applications on their computers because those applications are frequently slow to catch threats.

  31. Firewall

  32. A firewallcan either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic.

  33. POCKET FILTER (First Generation) Packet filters act by inspecting the "packets" which transfer between computers on the Internet. If a packet matches the packet filter's set of rules, the packet filter will drop (silently discard) the packet, or reject it. STATEFUL FIREWALL (Second Generation) The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known active connection will be allowed by the firewall; others will be rejected.

  34. APPLICATION LAYER FILTER (Third Generation) The key benefit of application layer filtering is that it can "understand" certain applications and protocols. This is useful as it is able to detect if an unwanted protocol is attempting to bypass the firewall on an allowed port, or detect if a protocol is being abused in any harmful way.

  35. Hardware Firewalls Hardware firewalls can be purchased as a stand-alone product but more recently hardware firewalls are typically found in broadband routers, and should be considered an important part of your system and network set-up, especially for anyone on a broadband connection. Hardware firewalls can be effective with little or no configuration, and they can protect every machine on a local network.

  36. Software Firewalls For individual home users, the most popular firewall choice is a software firewall. Software firewalls are installed on your computer (like any software) and you can customize it; allowing you some control over its function and protection features. A software firewall will protect your computer from outside attempts to control or gain access your computer, and, depending on your choice of software firewall, it could also provide protection against the most common Trojan programs or e-mail worms.

  37. Thank You

More Related