Ict CH-4
Ict CH-4
ICT Security
Chapter Objectives
• After completing this section the learner should be able to:
• Describe computer security objectives
• Define the key words used to discuss computer security
• Explain the primary mechanisms used to protect computers and their
contents
• Define computer viruses & identify some of the most common types
• Identify some ways to prevent or recover from a virus infection
Introduction
• Computer security is a system designed to protect your computer
from any damage.
• It may be for single computer or networked computers.
• Computer damage
• Hardware damage
• Software damage
• Data loss
• invasion of databases by unauthorized individuals.
Why to Secure Computer
• Computer-based information systems are much more exposed to different
problems such as abuse, human errors, and crime etc than the manual
system.
• Information in a computer must be protected from being accessed by
unauthorized individuals.
• There are three main objectives for computer security
• Confidentiality: preventing sensitive information from improper exposure.
• Availability: against accidental actions that cause information resources to be
unavailable to users when needed.
• Integrity: refers to protecting against deliberate or accidental corruption of
information.
• It refers to internal consistency.
Computer Security Key Words
• Assets:-is any information, software, personnel, hardware, or computer
facility
• Vulnerability:- is a point where a system is exposed to attack
• Threat:- the source of problem for the computer
• Person:- user of the computer
• Thing:- faulty equipment, virus, and software failure.
• Event:- interruption of electricity, fire, and flood, and network failure.
• Safeguard:- a technique for protecting computer from a threat
• So computer security is the process of applying safeguard to reduce
vulnerability of computer to threats
Protecting Computers
• Common Security Mechanisms
• Physical Security: It provides controls over the access and use of computer
facilities and equipment and controls for the prevention of theft
• Passwords: are a confidential sequence of characters that give approved
users access to computers
• Firewalls: guard against unauthorized access to an internal network
• Codes: encrypting mechanism to protect transmitted information
• Audits: is used to monitor and record computer transactions
• Backup: protection of data by keeping copies of sensitive data in several
different locations
Computer Viruses
• Computer viruses are specific type of programs written deliberately to
cause harm to someone’s computer or to use that computer in
unauthorized way.
• Virus Program
• Malicious (destructive) program/software that damages computer
• Needs a host to infect; the host is an innocent program
• Reproduces its own code by copying itself onto the host program
• Executes when infected program is executed
• Spreads from program to program or from disk to disk
• May damage the files on a computer or attack the system in general
Types of Viruses
• Worm
• Program that copies itself over and over again causing a computer to crash when it runs out of RAM/hard disk space
• Does NOT infect other programs
• Trojan Horse
• Program that appears to have a useful function but really does not
• Delivery vehicle for some code (logic bomb or virus) on to a computer
• Bomb (Logic Bomb):
• Program that waits a certain period of time before executing its code
• Piece of code embedded in a program or the operating system itself that waits for a particular event to occur
• Boot Sector Viruses
• Infect the boot sector and related areas on a hard or floppy disk
• Is activated every time the machine is powered on
• Program Viruses
• Contaminates files that contain computer code specially “.exe” and “.com” files
• Can be spread through any medium used to transport software
Prevention of Viruses
• Buying original software from the company that created the software
• Using an antivirus program (some are free, others you have to buy)
and making sure that it is updated regularly
• Back up – Continuous duplicating of important files/documents
• Re-formatting disk to erase boot sector and partition viruses
The End
Thank You !!!