0% found this document useful (0 votes)
29 views

Lesson 1 - 2 Introduction To Computer Security

This document provides an introduction to computer security. It outlines three learning outcomes: 1) understand computer security concepts and importance, 2) awareness about computer security, and 3) overview of ethical hacking. It then defines security and discusses security breaches of everyday technologies. It provides an overview of computer security, potential losses from security attacks, and elements of a secure system. It also discusses the benefits of security awareness and basic security practices. Finally, it gives a brief introduction to the concept of ethical hacking.

Uploaded by

Patrick Roman
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

Lesson 1 - 2 Introduction To Computer Security

This document provides an introduction to computer security. It outlines three learning outcomes: 1) understand computer security concepts and importance, 2) awareness about computer security, and 3) overview of ethical hacking. It then defines security and discusses security breaches of everyday technologies. It provides an overview of computer security, potential losses from security attacks, and elements of a secure system. It also discusses the benefits of security awareness and basic security practices. Finally, it gives a brief introduction to the concept of ethical hacking.

Uploaded by

Patrick Roman
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

INTRODUCTION TO

COMPUTER
SECURITY
INTRODUCTION
TO
COMPUTER SECURITY

Prepared by: Prof. Gary June D.


Benoya
LEARNING OUTCOMES:
At the end of the session, the students should be able to:
1. Understand computer security concept and importance
2. Awareness about computer security
3. Overview of ethical hacking
Introduction

to Security Concepts
Security Defined
 Security breaches of everyday technologies
 Essential Terminologies
 Computer Security
 Potential Losses Due to Security Attacks
 Elements of Security & Fundamental Concepts of Security
 What to Secure?
 What makes a System Secure?
 Benefits of Computer Security Awareness
 Basic Computer Security Checklist
 Overview of Ethical Hacking
Security

•The state of being free from danger or threat.


•The system is designed to provide maximum
security against toxic spills
10 of the biggest and most impactful
breaches
• Centene
• ADP
• Federal Bureau of Investigation, Department of Homeland Security
• Seagate
• Internal Revenue Service
• LinkedIn, MySpace
• 21st Century Oncology
• Office of Child Support Enforcement
• Federal Deposit Insurance Corporation
• Verizon Enterprise Services
COMPUTER SECURITY
• It is the process of preventing and detecting
unauthorized use of your computer.
• It involves the process of safeguarding against
intruders from using your computer resources for
malicious intents or for their own gains (or even
gaining access to them accidentally).
System hacking
It is the way hackers get access to individual computers on a
network.
Some reason why there is such hacking
•Profit
o Information can be sold
o Information can be used to steal
Protest
o E.g Hactivism:
A hacktivist is someone who utilizes technology to
announce a social, ideological. Religious, or
political message
Challenge
• Fun, problem-solving skill, the thrill of power
Hackers want to
• Use the victim’s computer to store illicit materials i.e. pirated software,
pornography, etc.
• Steal the victim’s personal information in order to access accounts or
the accounts of the website visitors. The data can be used to gain
access to important databases; merchant accounts etc.
• Set-up fake ecommerce sites to access credit card details; gain entry to
servers that contain credit card fraud
• Spy on friends, family, co-workers for personal reasons
• Revenge
Effects of hacking
• Damage to information
• Theft of information
• Credit card details, social security numbers, identity fraud, email addresses
• Compromise/ damage of systems
• Used of victim machines
• Businesses may suffer from damaged reputations and lawsuits
• Business secrets could be stolen and sold to competitors
• Computing system/infrastructure could suffer from performance degrading as the
resources used for malicious activities
• In an education institution, hacking can cause damage to the institution’s
credibility/reputation ie. If examination system is compromised and sensitive data
tempered.
Types of Hackers
• Black hats
Individuals with good computing knowledge, abilities and
expertise but with the intentions and conducts to cause
damage on the systems they attack.
• Also known as CRACKERS.
Types of Hackers

• White Hats
• Individuals with good hacking skills
• They perform defensive activities against hacking
• Also known as security analyst
Types of Hackers

•Gray Hats
•Individuals that perform both offensive and
defensive hacking activities
Types of Hackers

• Suicide hackers
• Individuals whom want to fall a computing system for a
personal reason or cause
• Not worried about the serious consequences that they may
have to face as result of their damaging activities i.e. being
jailed for many years.
Types of Hackers

• Ethical hackers
• Learn system hacking to detect, prevent, and
counter these types of attacks.
Footprinting
• It is the first and most convenient way that hackers use to
gather information about computer systems and the
companies they belong to.
• The purpose of foot printing to learn as much as you can
about a system, it's remote access capabilities, its ports
and services, and the aspects of its security
System Vulnerabilities
• Vulnerability
• It is the state of being open to injury, or appearing as if
you are. It might be emotional, like admitting that you're
in love with someone who might only like you as a
friend, or it can be literal, like the vulnerability of a
soccer goal that's unprotected by any defensive players.
Examples of attacks
•DoS/DDoS Attacks
•Password guessing attacks
•Man in the middle Attacks
•Identity Spoofing
•Backdoor Attacks
THANK YOU!!!

You might also like