0% found this document useful (0 votes)
15 views

Computer Security

Uploaded by

dejan.kumpa
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Computer Security

Uploaded by

dejan.kumpa
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Computer

Security
PROTECTING COMPUTER
SYSTEMS AND NETWORKS
Understanding
Cybersecurity
• Cybersecurity is the practice of protecting
systems, networks, and information from
digital attacks.
• Cybersecurity threats can come in many
forms, including viruses, malware, phishing
scams, and social engineering attacks.
• By following best practices and using the
right tools, individuals and organizations
can improve their cybersecurity posture
and reduce their risk of attack.
Common
Cybersecurity Threats

• Viruses and malware are malicious


programs designed to harm or exploit
systems.
• Phishing scams involve fraudulent emails
or messages designed to trick users into
giving away sensitive information.
• Social engineering attacks involve
manipulating people into divulging
sensitive information or taking actions
that are harmful to their organization.
Preventing Data
Breaches
• Data breaches can expose sensitive
information and cause significant financial
losses.
• To prevent data breaches, organizations
should implement strong access controls,
encrypt sensitive data, and monitor their
systems for suspicious activity.
• Individuals can also take steps to protect
themselves, such as using strong
passwords and being careful about the
information they share online.
Protecting • Malware is an umbrella term for any
software designed to cause harm to
Against Malware systems or networks.
• To protect against malware,
organizations should use antivirus
software, keep their systems up to
date, and train their employees to
recognize and respond to potential
threats.
• Individuals can also protect
themselves from malware by being
cautious when downloading files or
clicking on links, and by keeping their
operating system and anti-virus
software up to date.
The The first computer virus was created in
1971 by Bob Thomas and spread
History of through ARPANET.

Computer
Viruses Since then, computer viruses have
become more complex and have caused
billions of dollars in damages.

To prevent computer viruses, individuals


and organizations should use antivirus
software and exercise caution when
downloading files or clicking on links.
Types of Malware

• Adware is software that displays


unwanted ads or collects data on
users.
• Trojans are programs that appear to
be useful but are actually malicious.
• Ransomware is a type of malware
that encrypts a user's files and
demands payment for their release.
Phishing Scams and
Social Engineering
• Phishing scams involve fraudulent emails
or messages designed to trick users into
giving away sensitive information.
• Social engineering attacks involve
manipulating people into divulging
sensitive information or taking actions
that are harmful to their organization.
• To protect against phishing and social
engineering, individuals and organizations
should exercise caution and be vigilant.
Staying Safe
Online
• Use strong, unique passwords for
each account and change them
frequently.
• Be cautious when clicking on links or
downloading files from unknown
sources.
• Keep your operating system and anti-
virus software up to date to protect
against known vulnerabilities.
Firewalls and Intrusion
Detection Systems

• Firewalls are a type of network security


system that monitors and controls
incoming and outgoing network traffic.
• Intrusion detection systems (IDS) are
designed to detect and respond to
unauthorized access attempts to a
computer or network.
• By using firewalls and IDS,
organizations can protect their
networks against cyberattacks.
Encryption and
Cryptography
• Encryption is the process of converting
plain text into a coded message that
can only be read by authorized parties.
• Cryptography is the science of using
codes and ciphers to secure
communication.
• By using encryption and cryptography,
individuals and organizations can
protect their sensitive information from
unauthorized access.
Hacker News and
Closing Remarks
• Hacker News is a great source of
information on the latest security threats
and trends.
• Closing Remarks: Computer security is an
ongoing concern and it is important to
stay up-to-date on the latest threats and
techniques to protect against them.
Conclusion

• Computer security is a critical issue


for individuals and organizations
alike.
• By understanding the history of
computer security, actual events
and methods, and techniques to
protect against attacks, we can
better secure our systems and data.
Presentation History of Computer Security
The history of computer security is an important aspect of
understanding the current state of computer security. We will
Overview discuss the evolution of computer security from its early days to
modern times.

Actual Events and Methods


We will discuss actual events and methods used in computer
security such as data breaches, malware attacks and social
engineering. We will also explain how these methods work and how
to prevent them.

Microsoft Security and Compliance Courses


Microsoft provides a wide range of security and compliance courses
for IT professionals to learn about Microsoft technologies and
products. We will discuss some of these courses and their
importance.

EC-Council Courses
EC-Council is a global leader in cybersecurity training and
certification. We will discuss some of their courses and their
importance in the cybersecurity industry.
Brief History of Computer
Security
Computer Viruses
Computer viruses have been around since the beginning of computers. The
first computer virus was created in 1971 by Bob Thomas and spread
through ARPANET. Since then, computer viruses have been evolved and
become more complex.

Malware
In the 1980s, malware began to target specific operating systems, such as
the Apple II and IBM PC. Malware refers to any software that is designed to
cause harm to a computer system or network.

Computer Worms
The first computer worm, Morris Worm, was released in 1988. It is
considered one of the most damaging worms of its time and caused millions
of dollars in damages. It spread rapidly and infected thousands of
computers in a short amount of time.
Actual Events Data Breaches
Data breaches have become increasingly common in recent years,

and Methods
targeting large corporations and compromising sensitive data. High-
profile data breaches include the Equifax breach, Yahoo! breach, and
the Target breach.

Phishing
Phishing is a common method used by attackers to gain access to
systems. It involves sending fraudulent emails or messages to trick
users into giving away sensitive information, such as login credentials
or credit card details.

Social Engineering
Social engineering is a method used by attackers to manipulate
people into divulging sensitive information. This can be done through
phone calls, emails, or in-person interactions.

Malware
Malware is software designed to harm or exploit systems. Attackers
use various types of malware to gain unauthorized access to systems,
steal data, or disrupt operations.

You might also like