Seminar Presentation On Computer Security: Presented By: Anshu Singh Roll No.: 1701010032 Branch: CSE Section: A
Seminar Presentation On Computer Security: Presented By: Anshu Singh Roll No.: 1701010032 Branch: CSE Section: A
On
Computer Security
• Types of Attacks
• What to Secure?
Keylogger Virus
Man in the Middle
Phishing
The attacker sends bait often in the form of an e-mail. It encourages people to share their details.
Eavesdropping
Attacker observe the traffic on your system and the work you are doing on your system
SQL Injection
As the name suggests, an SQL injection vulnerability allows an attacker to inject malicious input
into an SQL statement
Password Attack
As the name suggests, this attack is used to crack or get the passwords for the user’s account.
Social Engineering
Attackers create social situations that encourages you to share password
What to secure?
CIA : Confidentiality, Integrity and Availability have served as the industry standard for computer
security since the time of first mainframes.
Motives Behind the Attack
How to secure computer?
2-Way Authentication
Two-factor authentication adds layer of security to the authentication process by making it harder for
attackers to gain access to a person’s devices or online accounts.
Secure passwords
Create strong passwords so that no one will be able to hack or remember your password
Regular Updates
Always keep your system and all software updated
You get updated because older version was hacked or was vulnerable
Antivirus
Antivirus is a computer program used to prevent, detect and remove malware.
Firewall
A firewall is a system designed to prevent unauthorized access to or from a private network
Firewalls prevent unauthorized Internet users from accessing private networks connected to the
internet, especially intranets.
No Phishing
When you get an e-mail that suspicious to you or has no relation with you, then do the
following:
Cryptography
Cryptography is associated with the process of converting ordinary plain text into cipher text
http://www.aspencrypt.com/
Thank You….