Computer and Internet Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 33

Computer Security?

• Is the protection of computer systems and data from:


Unauthorized access
Use
Disclosure
Disruption
Modification, or
Destruction
It is a broad term that encompasses a wide range of topics,
including:
information security
Network security
Application security and
Data security.
Cont….
• The goal of computer security is to protect the confidentiality,
integrity, and availability of computer systems and data.
• Confidentiality means that only authorized users should be able to
access information.
• Integrity means that information should not be modified without
authorization.
• Availability means that computer systems and data should be
available when needed.
Threats to computer security
• Malware: Malware is software that is designed to harm computer
systems or data.
• Examples of malware include viruses, worms, and Trojan horses.
• Phishing: Phishing is a type of social engineering attack where
attackers send fraudulent emails or create fake websites in an
attempt to trick users into revealing personal information, such as
passwords or credit card numbers.
• Data breaches: Data breaches occur when sensitive information is
stolen from a computer system or network. This can happen through
a variety of methods, such as hacking, phishing, or insider threats.
Cont…
• Denial-of-service attacks: Denial-of-service attacks (DoS) are
designed to make a computer system or network unavailable to
its intended users.
• This can be done by flooding the system with so much traffic that it
becomes overloaded and unable to respond.
There are a number of things that can be done
to improve computer security, including:
• Using strong passwords and changing them regularly
• Keeping software up to date
• Using a firewall
• Being careful about what information you share online
• Educating yourself about computer security threats
• Use two-factor authentication (2FA) whenever possible. 
• Be careful about what links you click on in emails and on websites. If
you're not sure if a link is legitimate, don't click on it.
• Back up your data regularly. This will help you to recover your data if it is
lost or stolen.
Physical Computer Security
• Physical computer security is the protection of computer systems and data
from physical threats, such as theft, vandalism, and natural disasters.
• Help to prevent unauthorized access to computer systems and data, as
well as the destruction of computer systems and data.
• Physical security measures
• Physical access control: This involves restricting access to computer
systems and data to authorized personnel only. This can be done
through the use of security guards, key cards, and biometric scanners.
• Environmental controls: This involves protecting computer systems and
data from environmental hazards, such as fire, flood, and power
outages. This can be done through the use of fire suppression
systems, flood barriers, and uninterruptible power supplies.
Cont…
• Security awareness training: This involves educating employees about
computer security threats and how to protect themselves and their
organization from these threats.
• Tips for improving physical computer security:
• Keep computer systems and data in a secure location. This could be a
locked room or cabinet.
• Use security cameras to monitor your computer systems and data. This
will help you to identify any unauthorized access or activity.
• Back up your computer systems and data regularly. This will help you
to recover your data if it is lost or stolen. 
To create a Windows restore point, follow
these steps:

• Open the Control Panel.


• Click on System and Security.
• Click on System.
• Click on Protection.
• Click on Create a restore point.
• Click on Create.
Backup operating system
• Here are some of the benefits of backing up your operating system:
• It can help you to recover from a system crash. 
• It can help you to recover from a virus or malware infection. 
• It can help you to recover from data loss. 
Create file backup on Windows 10
from File History
• Open Settings.
• Click on Update & Security.
• Click on Backup.
• Under the “Back up using File History” section, click the Add a
Drive button.
• Select the external or removable drive to use as the backup
destination.
• Turn on the “Automatically back up my files” toggle switch.
The most popular backup software programs
• Acronis True Image
• AOMEI Backupper
• Macrium Reflect
• Paragon Backup & Recovery
Upgrade
• Open cmd as administrator
• Type Winget upgrade = its shows list of upgrade requires softwraes
• Winget upgrade --all = to upgrade all
Common Network Security Measures:
• Firewalls: Firewalls are devices that filter network traffic and block
unauthorized access.
• Intrusion detection systems (IDSs): IDSs monitor network traffic for
suspicious activity.
• Intrusion prevention systems (IPSs): IPSs can take action to block
suspicious activity.
• Antivirus software: Antivirus software can scan files for malware and
remove it.
• Web filtering software: Web filtering software can block access to
malicious websites.
• Email filtering software: Email filtering software can block spam and
phishing emails.
Computer and Internet Security
  Computer Security
  Protecting computers, information, and
services from unauthorized access, change or
destruction.
  Internet security extends this concept to
systems that connected to the Internet
○  Browsing the Internet
○  Electronic Commerce
○  Social Networking
○  Emailing
Why Should I care
• Infections from viruses, spyware, or malware
Virus - Program designed to infect your computer,
replicates itself , and usually causes lost or corrupt data
Spyware is a type of malicious code that tracks your
habits on the internet without you knowing it; usually
collects personal information
Phishing, Hoaxes, Malware, Scams and Spam
• The most prevalent and persistent threats to your
security come to you in your Inbox.
• They come by different names and may even appear
legitimate and even supposedly from people you may
know.
• They all have this in common: they are designed to get
you to click on an item like an attachment, link or picture.
• Privacy and personal security concerns
Preventing private, personal, or sensitive information
from being disclosed
Basic Approaches to Security
• Use anti-virus and anti-spyware Software
• Detects and removes viruses and spyware from your
computer
• Must be kept up to date
• Install security patches
• Enable Firewalls
• Protects computers by preventing unauthorized access

You might also like