Computer Security and Privacy, Authorisation and Unauthorized Access, Cyber Crime
Computer Security and Privacy, Authorisation and Unauthorized Access, Cyber Crime
Presented by:
Sarmila khatri
Muskan shah
Akshana basnet
Aarati kumara
meheta
What is computer security and
privacy??
• Computer security involves safeguarding computer
systems, networks, and data from unauthorized access,
attacks and damage.
• Unauthorized used
Unauthorized used refers to actions taken within a network
without proper authorization such as modification without
permission, copying..etc.
Unauthorized access and
unauthorized used
• Hacking: it refers to unauthorized access,
manipulation, breakdown of computer system,
network, or data.
• It can involved finding weakness, gaining access
to information for various purpose like theft…
• often performed via wireless network
War driving: it is a act of searching WiFi or wireless
network while moving around in a vehicle.
WiFi piggybacking: it is the practice of using
someone else’s wireless internet connection without
their permission typically by accessing unsecured or
poorly secured network from near location.
Interception of communication: It refers to the
act of secretly monitoring or eavesdropping on
electronic communication such phone calls, emails,
text..etc.
Protecting against unauthorized access and
unauthorized used
1.Access control system
used to control access to facilities, computer networks, company
database and website accounts.
Authentication system: it is the mechanisms used to verify the
identity of users to accessing the system. It main aim is to ensure
that only authorized users can gain access to the system.
Identification system: used to determined or recognize the
individuals or entities within a system.
2. Possessed knowledge Access System :
– uses information only the individual should know to identify
that individual.
– password and cognitive authentication system fall into this
category.
• It includes typically passwords
• Passwords should be strong and changed frequently.
–Advantages
• Enhanced security
• Personalized access
–Disadvantages
• forgotten or Lost password
• Vulnerability to hacking
Password Strategies:
1. Make the password word at least eight characters and include both
uppercase and lowercase letters, as well as numbers and special symbols.
2. Don’t use information in your password that others might know about you or
that is in your social media (example: birthdays, children's name, pets name,
or address).
3. To make a password easier to remember make a sentences and ( use first
letter of each word) and add some symbol & numbers . Example: My
password is not strong –Mp&2ins!.
4. Use different password for different accounts i.e if one account is
compromised, at least the other won’t be at risk.
5. Do not keep a written copy of the password in your desk or tapped to your
monitor. Use a password manager to help create and manage strong ,
unique password for all your accounts . Example: Enpass premium,1
password, sticky password.
6. Change your password frequently at least every 6 months.
Cognitive authentication system:
–Disadvantages:
• Can be lost or used by an unauthorized
individual.
5. Biometric Access System:
–uses one unique physical characteristic of an
individual to authenticate that individual.
–Example
• Fingerprint,
• a face, veins,
• a voice.
–Advantages:
very accurate
cannot be lost or forgotten .
–Disadvantages:
Cannot be reset if compromised
Hardware and software are expensive
6. Controlling Access to Wireless Networks:
Antivirus software
Trend box
• Beyond Fingerprint Readers- Digital tattos and more
• Facial gesture can be used to unlock a phone by smiling or
wrinkling at it
• Some include liveness check
• Future alternatives for logging individuals on to devices or
secure websites
• Digital tattoos are stamped onto skin
• Authentication pills are swallowed