Anda di halaman 1dari 25

COMPUTER & INTERNET SECURITY

ByTanaya Shrivastava XI D Roll no. 4

Computer & Internet Security - Tanaya Shrivastava

IMPORTANT TERMS AT A GLANCE


2

Threat
An action or event that might compromise security. A threat is a violation of security.

Vulnerability
Existence of weakness, design or implementation error that can lead into an unexpected or undesired event compromising the security of the system.

Computer & Internet Security - Tanaya Shrivastava

Attack
An attack is any action that violates security.

Exploit
A defined way to breach the security of any computer system or network through its vulnerabilities. 3

SECURITY
A state of well-being of information and infrastructure in which the possibility of successful yet undetected theft, tampering and disruption of information is kept low or intolerable.

Computer & Internet Security - Tanaya Shrivastava

Any Hacking event will affect one or more security events.

Computer & Internet Security - Tanaya Shrivastava

HACKING
5

CAN HACKING BE ETHICAL


Hacker
Computer & Internet Security - Tanaya Shrivastava

Refers to the person who enjoys learning the details of the computer systems to stretch his/her capabilities. Cracker Refers to a person who uses hacking skills for offensive purpose. Ethical Hacker Refers to the security professional who uses hacking for defensive purposes.

CRACKING - A CYBER CRIME

Computer & Internet Security - Tanaya Shrivastava

Computer & Internet Security - Tanaya Shrivastava

HOW DO HACKERS & CRACKERS ACT


8

HOW DO HACKERS & CRACKER ACT?


Virus
Computer & Internet Security - Tanaya Shrivastava

Worm

Spamming mails
Phishing

VIRUSES & WORMS


Virus
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
Computer & Internet Security - Tanaya Shrivastava

Worm
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

10

MALWARE

Malware, short for malicious software, is software to help hackers disrupt users computer operation, gather sensitive information, or gain unauthorized access to a computer system. While it is often software, it can also appear in the form of script or code. 'Malware' is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or code.

11

Computer & Internet Security - Tanaya Shrivastava

12

Computer & Internet Security - Tanaya Shrivastava

SPYWARE

Spyware is a type of malware (malicious software) installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Spyware is often secretly installed on a user's PC without their knowledge.

Computer & Internet Security - Tanaya Shrivastava

However, some spyware such as keyloggers may be installed by the owner of a shared, corporate, or PC on purpose in order to intentionally monitor users.

13

Trojan Trojan horses are impostorsfiles that claim to be something desirable but, in fact, are malicious. A very important distinction between Trojan horse programs and true viruses is that they do not replicate themselves. Trojan horses contain malicious code that when triggered cause loss, or even theft, of data. For a Trojan horse to spread, you must invite these programs onto your computers; for example, by opening an email attachment or downloading and running a file from the Internet. Trojan Vundo is a Trojan horse.

14

Computer & Internet Security - Tanaya Shrivastava

15

Computer & Internet Security - Tanaya Shrivastava

COOKIE

A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is usually a small piece of data sent from a website and stored in a user's web browser while a user is browsing a website. When the user browses the same website in the future, the data stored in the cookie can be retrieved by the website to notify the website of the user's previous activity. Although cookies cannot carry viruses, and cannot install malware on the host computer, tracking cookies and especially third-party tracking cookies are commonly used as ways to compile longterm records of individuals' browsing histories a major privacy concern that has prompted European and US law makers to take action.

16

Computer & Internet Security - Tanaya Shrivastava

Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email. Definitions of spam usually include the aspects that email is unsolicited and sent in bulk. Botnets, networks of virus-infected computers, are used to send about 80% of spam.

Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications

Computer & Internet Security - Tanaya Shrivastava

Spam

Phishing

17

18

Computer & Internet Security - Tanaya Shrivastava

AN EXAMPLE OF PHISHING MAIL

19

Computer & Internet Security - Tanaya Shrivastava

20

Computer & Internet Security - Tanaya Shrivastava

Computer & Internet Security - Tanaya Shrivastava

PROTECTING THE COMPUTER NETWORK


21

FIREWALL
A firewall can either be software-based or hardware-based and is used to help keep a network secure. Firewalls are used to protect computer networks from hostile intrusions.

22

Computer & Internet Security - Tanaya Shrivastava

FIREWALL PROTECTING INTRUSION

23

Computer & Internet Security - Tanaya Shrivastava

24

Computer & Internet Security - Tanaya Shrivastava

Computer & Internet Security - Tanaya Shrivastava

THANK YOU!
25

Anda mungkin juga menyukai