Computer System Security (CSS) KNC - 301
Computer System Security (CSS) KNC - 301
KNC - 301
Presented By
Mr. Meharban Ali
What is computer Security
• Computer network security consists of measures
taken by business or some organizations .
• It monitors and prevent unauthorized access from
the outside attackers.
• Network Administrator controls access to the data
and software on the network.
• A network administrator assigns the user ID and
password to the authorized person.
Aspects of Network Security:
• System-based attacks :-
• These are the attacks which are intended to
compromise a computer or a computer
network. Some of the important system-based
attacks are as follows
Continued
1. Virus :-
• It is a type of malicious software program that
spread throughout the computer files without the
knowledge of a user.
• It is a self-replicating malicious computer program
that replicates by inserting copies of itself into
other computer programs when executed.
• It can also execute instructions that cause harm to
the system.
Continued
2. Worm :-
• It is a type of malware whose primary function
is to replicate itself to spread to uninfected
computers.
• It works same as the computer virus. Worms
often originate from email attachments that
appear to be from trusted senders.
Continued
3. Trojan horse :-
• It is a malicious program that occurs unexpected
changes to computer setting and unusual
activity, even when the computer should be idle.
• It misleads the user of its true intent.
• It appears to be a normal application but when
opened/executed some malicious code will run
in the background.
Continued
4. Backdoors :-
• It is a method that bypasses the normal
authentication process.
• A developer may create a backdoor so that an
application or operating system can be
accessed for troubleshooting or other
purposes.
Continued
5. Bots :-
• A bot (short for "robot") is an automated process
that interacts with other network services.
• Some bots program run automatically, while
others only execute commands when they
receive specific input.
• Common examples of bots program are the
crawler, chatroom bots, and malicious bots.
The Marketplace
for vulnerabilities
The Marketplace for vulnerabilities