Computer security involves protecting computer systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It aims to ensure the confidentiality, integrity, and availability of computer systems and data through measures that address threats such as malware, phishing, data breaches, and denial-of-service attacks. Effective computer security requires strong passwords, updated software, firewalls, secure online behavior, backups, and security awareness training.
Computer security involves protecting computer systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It aims to ensure the confidentiality, integrity, and availability of computer systems and data through measures that address threats such as malware, phishing, data breaches, and denial-of-service attacks. Effective computer security requires strong passwords, updated software, firewalls, secure online behavior, backups, and security awareness training.
Computer security involves protecting computer systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It aims to ensure the confidentiality, integrity, and availability of computer systems and data through measures that address threats such as malware, phishing, data breaches, and denial-of-service attacks. Effective computer security requires strong passwords, updated software, firewalls, secure online behavior, backups, and security awareness training.
Computer security involves protecting computer systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It aims to ensure the confidentiality, integrity, and availability of computer systems and data through measures that address threats such as malware, phishing, data breaches, and denial-of-service attacks. Effective computer security requires strong passwords, updated software, firewalls, secure online behavior, backups, and security awareness training.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 33
Computer Security?
• Is the protection of computer systems and data from:
Unauthorized access Use Disclosure Disruption Modification, or Destruction It is a broad term that encompasses a wide range of topics, including: information security Network security Application security and Data security. Cont…. • The goal of computer security is to protect the confidentiality, integrity, and availability of computer systems and data. • Confidentiality means that only authorized users should be able to access information. • Integrity means that information should not be modified without authorization. • Availability means that computer systems and data should be available when needed. Threats to computer security • Malware: Malware is software that is designed to harm computer systems or data. • Examples of malware include viruses, worms, and Trojan horses. • Phishing: Phishing is a type of social engineering attack where attackers send fraudulent emails or create fake websites in an attempt to trick users into revealing personal information, such as passwords or credit card numbers. • Data breaches: Data breaches occur when sensitive information is stolen from a computer system or network. This can happen through a variety of methods, such as hacking, phishing, or insider threats. Cont… • Denial-of-service attacks: Denial-of-service attacks (DoS) are designed to make a computer system or network unavailable to its intended users. • This can be done by flooding the system with so much traffic that it becomes overloaded and unable to respond. There are a number of things that can be done to improve computer security, including: • Using strong passwords and changing them regularly • Keeping software up to date • Using a firewall • Being careful about what information you share online • Educating yourself about computer security threats • Use two-factor authentication (2FA) whenever possible. • Be careful about what links you click on in emails and on websites. If you're not sure if a link is legitimate, don't click on it. • Back up your data regularly. This will help you to recover your data if it is lost or stolen. Physical Computer Security • Physical computer security is the protection of computer systems and data from physical threats, such as theft, vandalism, and natural disasters. • Help to prevent unauthorized access to computer systems and data, as well as the destruction of computer systems and data. • Physical security measures • Physical access control: This involves restricting access to computer systems and data to authorized personnel only. This can be done through the use of security guards, key cards, and biometric scanners. • Environmental controls: This involves protecting computer systems and data from environmental hazards, such as fire, flood, and power outages. This can be done through the use of fire suppression systems, flood barriers, and uninterruptible power supplies. Cont… • Security awareness training: This involves educating employees about computer security threats and how to protect themselves and their organization from these threats. • Tips for improving physical computer security: • Keep computer systems and data in a secure location. This could be a locked room or cabinet. • Use security cameras to monitor your computer systems and data. This will help you to identify any unauthorized access or activity. • Back up your computer systems and data regularly. This will help you to recover your data if it is lost or stolen. To create a Windows restore point, follow these steps:
• Open the Control Panel.
• Click on System and Security. • Click on System. • Click on Protection. • Click on Create a restore point. • Click on Create. Backup operating system • Here are some of the benefits of backing up your operating system: • It can help you to recover from a system crash. • It can help you to recover from a virus or malware infection. • It can help you to recover from data loss. Create file backup on Windows 10 from File History • Open Settings. • Click on Update & Security. • Click on Backup. • Under the “Back up using File History” section, click the Add a Drive button. • Select the external or removable drive to use as the backup destination. • Turn on the “Automatically back up my files” toggle switch. The most popular backup software programs • Acronis True Image • AOMEI Backupper • Macrium Reflect • Paragon Backup & Recovery Upgrade • Open cmd as administrator • Type Winget upgrade = its shows list of upgrade requires softwraes • Winget upgrade --all = to upgrade all Common Network Security Measures: • Firewalls: Firewalls are devices that filter network traffic and block unauthorized access. • Intrusion detection systems (IDSs): IDSs monitor network traffic for suspicious activity. • Intrusion prevention systems (IPSs): IPSs can take action to block suspicious activity. • Antivirus software: Antivirus software can scan files for malware and remove it. • Web filtering software: Web filtering software can block access to malicious websites. • Email filtering software: Email filtering software can block spam and phishing emails. Computer and Internet Security Computer Security Protecting computers, information, and services from unauthorized access, change or destruction. Internet security extends this concept to systems that connected to the Internet ○ Browsing the Internet ○ Electronic Commerce ○ Social Networking ○ Emailing Why Should I care • Infections from viruses, spyware, or malware Virus - Program designed to infect your computer, replicates itself , and usually causes lost or corrupt data Spyware is a type of malicious code that tracks your habits on the internet without you knowing it; usually collects personal information Phishing, Hoaxes, Malware, Scams and Spam • The most prevalent and persistent threats to your security come to you in your Inbox. • They come by different names and may even appear legitimate and even supposedly from people you may know. • They all have this in common: they are designed to get you to click on an item like an attachment, link or picture. • Privacy and personal security concerns Preventing private, personal, or sensitive information from being disclosed Basic Approaches to Security • Use anti-virus and anti-spyware Software • Detects and removes viruses and spyware from your computer • Must be kept up to date • Install security patches • Enable Firewalls • Protects computers by preventing unauthorized access