Computer Security
Computer Security
Security
PROTECTING COMPUTER
SYSTEMS AND NETWORKS
Understanding
Cybersecurity
• Cybersecurity is the practice of protecting
systems, networks, and information from
digital attacks.
• Cybersecurity threats can come in many
forms, including viruses, malware, phishing
scams, and social engineering attacks.
• By following best practices and using the
right tools, individuals and organizations
can improve their cybersecurity posture
and reduce their risk of attack.
Common
Cybersecurity Threats
Computer
Viruses Since then, computer viruses have
become more complex and have caused
billions of dollars in damages.
EC-Council Courses
EC-Council is a global leader in cybersecurity training and
certification. We will discuss some of their courses and their
importance in the cybersecurity industry.
Brief History of Computer
Security
Computer Viruses
Computer viruses have been around since the beginning of computers. The
first computer virus was created in 1971 by Bob Thomas and spread
through ARPANET. Since then, computer viruses have been evolved and
become more complex.
Malware
In the 1980s, malware began to target specific operating systems, such as
the Apple II and IBM PC. Malware refers to any software that is designed to
cause harm to a computer system or network.
Computer Worms
The first computer worm, Morris Worm, was released in 1988. It is
considered one of the most damaging worms of its time and caused millions
of dollars in damages. It spread rapidly and infected thousands of
computers in a short amount of time.
Actual Events Data Breaches
Data breaches have become increasingly common in recent years,
and Methods
targeting large corporations and compromising sensitive data. High-
profile data breaches include the Equifax breach, Yahoo! breach, and
the Target breach.
Phishing
Phishing is a common method used by attackers to gain access to
systems. It involves sending fraudulent emails or messages to trick
users into giving away sensitive information, such as login credentials
or credit card details.
Social Engineering
Social engineering is a method used by attackers to manipulate
people into divulging sensitive information. This can be done through
phone calls, emails, or in-person interactions.
Malware
Malware is software designed to harm or exploit systems. Attackers
use various types of malware to gain unauthorized access to systems,
steal data, or disrupt operations.