Upload
vishwarajyadav
View
1.683
Download
1
Tags:
Embed Size (px)
Citation preview
1
Computer security Against threats
A presentation by Vishwaraj Yadav and Saurav Mohapatra of class 11th
Cannas
2
Contents• Security of computer
• Threats to computer security
• Solutions to computer threats
3
Security of system• Nowadays, Computers are used
everywhere. Various data is shared from one computer to another. But sometimes the data is not trustworthy, or it behaves in an undesired manner. If this happens then our computer is insecure.
4
Continued….
• So to make our computer secured we need Computer security.
• It is the ability of computer to protect information & system resources with respect to confidentiality & integrity.
5
• A threat is a potential violation to security. When it is executed it becomes attack.
Threats to computer security
6
Threats to computer security
PC Intrusion
Spyware Adware Spamming Viruses
Worms
Trojans
Phishing
7
Computer Virus• Viruses are malicious codes that cause
damage to data, they can attack to any part of computer’s software such as boot block, files & application programs etc.
• Worms & Trojan horses are similar programs having virus-like effects.
8
Computer Virus
• Worms- A self-replicating program which eats up the entire disk space or memory.
• Trojan Horses- It is a program which appears harmless but performs malicious functions such as deleting or damaging files.
9
Computer Virus
• How do viruses damage computer?
1. They damage or delete files.
2. Slow down the computer.
3. Invade your email program.
10
Computer Viruses
Boot sector viruses
File viruses
Macro viruses
Multipartite viruses
Polymorphic viruses
11
Computer Virus
Types of Computer Virus • Boot Sector Virus
Boot sector viruses infect the boot sectors on floppy disks and hard disks, and can also infect the master boot record on a user's hard drive.
• File Virus
Operate in memory and usually infect executable files.
• Polymorphic virus
They mutate their own code to make it difficult for antivirus to detect and remove.
12
Computer Virus• Multi-partite Virus
Multi-partite viruses have characteristics of both boot sector viruses and file infector viruses.
• Macro Virus
They infect macro utilities that accompany such applications as Microsoft Word, Excel and outlook.
13
Example of computer virus
I LOVE YOU• VBS/LoveLetter is a VBScript worm. It
spreads through e-mail as a chain letter. • This worm sends itself to email addresses in
the Microsoft Outlook address book and also spreads to Internet chatrooms.
• This worm overwrites files on local and remote drives, including files with the extensions .html, .c,.bat,.mp3 etc.
14
spyware
• Spyware is a software which is installed in the computer to spy on the activities done on the computer.
• It tracks what all user does and reports it to the central source. They are used to spy either for legal purpose or illegal purpose.
15
Spyware
16
spyware
• How do spyware cause damage?
1. They monitor information such as what sites you visit or record keystrokes which can lead to identity thefts.
2. Some spywares alter PC settings like position of your desktop icons etc.
3. It can rob the PC of system speed and internet access efficiency.
17
Adware
• These are programs that deliver unwanted ads to computer(in the form of pop-ups).
18
Adware
• How do adware damage computer?
1. Adware tracks the information just like spyware.
2. When adware infects the computer, we will receive frequent pop-ups appearing out of nowhere.
3. The appearing of large number of ads ,the PC starts to slow down.
19
Spamming
• Spamming refers to sending of bulk-mail by an identified or unidentified source. The attacker keeps on sending bulk mail to various accounts until mail server runs out of disk space.
20
Spamming
• How do spams damage computer?
1. Spam messages circulating across internet disrupt email delivery & system performance.
2. Spams eats up time.
3. Spam messages contain fraud material and can even spread viruses.
21
PC Intrusion
• Every PC connected to Internet are target of hackers. Hackers constantly attack computers.
22
PC Intrusion
• How can it damage the system?
1. Sweeper attack- Hackers use it to delete all the data in the system.
2. Denial of service- Thais attack eats up all the resources of system and system or application doesn’t work.
3. Password guessing- Hackers crack or guess passwords of account to gain entry into remote computer systems.
Back to contents
23
Solutions to computer threats
• The computer security protects the computer through threats by taking actions or taking prevention. There are two solutions to these threats-
1. Active Protection
2. Preventive Maesures
24
Continued…
• Active Protection- Installing and using antivirus that includes Internet security-which includes protection against viruses, spyware & PC intrusion.
• Preventive measures- Even though security programs detect & eliminate threats but we should help prevent these issues from ever arising.
25
Continued…
• Solutions to viruses, adware,spyware
1. Active protection• Use Anti-virus and Anti-spyware
software.• Download updates regularly.• Run frequent full-system scans.
26
2. Preventive measures• Keep your system up-to-date.• Use caution when downloading files on
the internet.• Be careful with email.• Disable Cookies, if possible.
Continued…
27
• Solutions to Spam
1. Active Protection:-Methods used by
anti-spam software-
(a)Sender FilteringDigital CertificatesDigital Signatures
(b)Keyword Filtering
Continued…
28
Solutions to PC intrusion:-AuthorizationAuthenticationFirewall
Continued…
29
Thank U 4
ur attention