Computer Security
Computer Security
Introduction
Network Security
Basic Components Of Computer Security
Online Security Vs Online Safety
Risks & Threats
Steps to protect information
Steps to protect computer
Ethical Impact
Case study
Statistics about Internet Crime
survey
conclusion
References
Introduction
Security: We must
secure our computers
with technology in the
same way that we
secure the doors to
our offices
Safety: We must act
in ways that protect us
against the risks and
threats that come with
Internet use
Risks and Threats
Virus Hacking
Worm Phishing
Trojan Horse Spoofing
Spyware Denial of Service
Viruses/Worms
Software programs Trojan Horses
designed to invade
your computer, and Viruses that pretend to Spyware
copy, damage or be programs that help
you while destroying Software that secretly
delete your data watches and records
your data and damaging
your computer your online activities
or send you endless
pop-up ads
Did You Know …
( 1972 )
Worms
( 1978 )
Trojan Horses
( 1983 )
Spyware
Sluggish PC performance
An increase in pop-up ads
Mysterious new toolbars you can’t delete
Unexplained changes to homepage settings
Puzzling search results
Frequent computer crashes
How does PC get infected ?
An Internet firewall
is like a moat around
a castle, creating a
barrier between
your computer and
the Internet
Keep Your System Updated
Use antispyware
software so unknown
people cannot lurk
on your computer
and potentially steal
your information
Other Ways to Protect Your PC
- Back up your files regularly
Save to CD
or DVD
Use a Web-based
backup service
Practice Safe E-Mail
Delete spam
Close Pop-ups Using Red “X”
http://en.wikipedia.org/wiki/Computer_security
http://www.clearwisdom.net/emh/articles/2008/7/23/99177.html
http://its.ucsc.edu/security_awareness/intro.pdf
http://nurseweb.ucsf.edu/public/07fa-computer-security.ppt
http://www.acsac.org/secshelf/book001/02.pdf
Thank You For Listening
Any Question ?