13
COMPUTER SECURITY COMPILATION

Computer securit ycompilation

Embed Size (px)

DESCRIPTION

compsec

Citation preview

Page 1: Computer securit ycompilation

COMPUTER SECURITYCOMPILATION

Page 2: Computer securit ycompilation

Computer Security

a branch of computer Technology known as information security as applied to computers and networks

Page 3: Computer securit ycompilation

The objective of computer security includes protection of information and property from

• Theft• Corruption• Natural disaster

while allowing the information and propertyto remain accessible and productive to its intended users

Page 4: Computer securit ycompilation

AppArmor

("Application Armor") is a security module for the Linux kernel, released under the GNU General Public License. AppArmor allows the system administrator to associate with each program a security profile that restricts the capabilities of that program.

Page 5: Computer securit ycompilation

Computer Security Win 8Microsoft is looking to bypass what hacker

Kevin Mitnick has called the weakest link of computer security

able to store any passwords you create, then sync them across all other trusted Windows 8 machines

Microsoft is also taking security a step further for business users by helping simplify the dedicated hardware requirement for public/private key encryption, a more secure version of credentials exchange

Page 6: Computer securit ycompilation

VISTA is an operating system released in several

variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs.

Page 7: Computer securit ycompilation

Security & Safety

BitLocker Drive Encryption is a security feature that provides better data protection for your computer by encrypting all data stored on the Windows operating system volume.

Encrypting File System, available in Business, Enterprise, and Ultimate editions of Windows Vista, is useful for user-level file and folder encryption.

Page 8: Computer securit ycompilation

Security & Safety

The parental controls built into Windows Vista help parents determine which games their children can play, which programs they can use, and which websites they can visit—and when.

Shadow copy is automatically turned on in Windows Vista and creates copies, on a scheduled basis, of files that have changed. Since only incremental changes are saved, minimal disk space is used for shadow copies.

Page 9: Computer securit ycompilation

What is iOS?iOS (formerly iPhone OS) is Apple Inc.'s mobile

operating system.Originally developed for the iPhone, it has since

been extended to support other Apple, Inc. devices such as the iPod Touch, iPad, and Apple TV.

Apple, Inc. does not license iOS for installation on non-Apple hardware.

Page 10: Computer securit ycompilation

Computer Security in Windows 7

• Microsoft Security Essentials

• Windows Defender

Page 11: Computer securit ycompilation

Android Security for Antivirus and Loss

Protection• Lookout Mobile Security A free

account lets you scan your phone for malware, back up and restore your data online, and use GPS to locate your phone should it ever get lost or stolen.

• Norton Mobile Security allows remotely locks and wipes your phone by text message. It can also lock down the SIM card.

Page 12: Computer securit ycompilation

What is the Security Features iOS?Geo location - If you lose your iPhone this feature

is very handy.Auto erase - you can remotely ask Apple to erase

the data on your device.Data encryption - iOS can encrypt your

confidential corporate data.4 layers of OS - iOS apps cannot directly access

the underlying hardware.

Page 13: Computer securit ycompilation

terminologies of securityTERMINOLOGY MEANING

Authentication  techniques can be used to ensure that communication end-points are who they say they are.

Firewalls  can provide some protection from online intrusion.

Anti-virus software  consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software

Backups  are a way of securing information

Encryption  is used to protect the message from the eyes of others.

Pinging  The ping application can be used by potential crackers to find if an IP address is reachable. If a cracker finds a computer, they can try a port scan to detect and attack services on that computer.