Lesson 1 - 2 Introduction To Computer Security
Lesson 1 - 2 Introduction To Computer Security
COMPUTER
SECURITY
INTRODUCTION
TO
COMPUTER SECURITY
• White Hats
• Individuals with good hacking skills
• They perform defensive activities against hacking
• Also known as security analyst
Types of Hackers
•Gray Hats
•Individuals that perform both offensive and
defensive hacking activities
Types of Hackers
• Suicide hackers
• Individuals whom want to fall a computing system for a
personal reason or cause
• Not worried about the serious consequences that they may
have to face as result of their damaging activities i.e. being
jailed for many years.
Types of Hackers
• Ethical hackers
• Learn system hacking to detect, prevent, and
counter these types of attacks.
Footprinting
• It is the first and most convenient way that hackers use to
gather information about computer systems and the
companies they belong to.
• The purpose of foot printing to learn as much as you can
about a system, it's remote access capabilities, its ports
and services, and the aspects of its security
System Vulnerabilities
• Vulnerability
• It is the state of being open to injury, or appearing as if
you are. It might be emotional, like admitting that you're
in love with someone who might only like you as a
friend, or it can be literal, like the vulnerability of a
soccer goal that's unprotected by any defensive players.
Examples of attacks
•DoS/DDoS Attacks
•Password guessing attacks
•Man in the middle Attacks
•Identity Spoofing
•Backdoor Attacks
THANK YOU!!!