SlideShare a Scribd company logo
2
Most read
4
Most read
15
Most read
Introduction
• We live in a world at a time which is often called
InformationAge.
• Internet has revolutionized the world and people are getting
used to having access to whatever information they want
anytime, anywhere.
• Unfortunately, this also has resulted in increased security
concerns.
• This chapter talks about the threats that are associated with
online access and the measures to prevent and counter them.
Threats to Computer
Security
• A Threat is a potential violation of security. When a threat is
actually executed, it becomes attack. Those who executes such
actions, or cause them to be executed are called attackers.
• Some common threats the average computer user faces
everyday are-
1. Viruses :
2. Worms
3. Trojans
4. Spyware
5. Adware
6. Spamming
7. PC Intrusion:
8. Denial of Service
9. Sweeping
10. Password Guessing
11. Phishing
• They are also known as Malware that harms your computer.
Computer Viruses
• Computer Virus are malicious code/programs that cause damage to data
and files on a system.
• Virus can attack any part of a computer’s software such as boot sector,
operating system, system areas, files, applications-program-macro etc.
• Two other similar programs also cause virus like effects. These are-
• Worms: a worm is a self replicating program which eats up the entire disk
space or memory. A worm keeps on creating its copies until all the disk
space or memory is filled.
• Trojans Hoursesa A destructive program that masquerades as a benign
application. Unlike viruses, Trojan horses do not replicate themselves but they
can be just as destructive. One of the most insidious types of Trojan horse is a
program that claims to rid your computer of viruses but instead
introduces viruses onto your computerDamages caused by Viruses:
– Damage or Delete files.
– Slow down your computer.
– Invade your email programs.
Spyware
• Spyware is a software which is installed on your computer to spy on
your activities and report this data to people willing to pay for it.
• Spyware mostly get installed on your PC without your consent.
• Roughly 32% computers of the world are infected with some type of
Malware.
• Damages caused by Spyware :
• Compromises your data,
computing habits and identity.
– Alter PC settings.
– Slow down your PC.
Adware
• These are the programs that deliver unwanted ads to your
computer. They consume your network bandwidth. Adware is similar
to spyware. You have to be very careful while installing a software.
• Damages caused by Adware:
– Adware tracks your information
just like spyware.
– Displays arrays of
advertising.
– Slow down your PC.
Spamming
Spamming refers to the sending of bulk-mail by an
identified or unidentified source.in malicious form, the
attacker keeps on sending bulk mail until the mail-server
runs out of disk space.
• Damages caused by Spamming-
• Spam reduces productivity.
• Spam eats up your time.
• Spam can lead to worse things.
PC Intrusion
Every PC connected to the internet is a potential target for
hackers. PC intrusion can occur in any of the following form-
• Sweeper Attack :
This is another malicious program used by
hackers which sweeps all the data from the
system.
• Denial of Services:
This eats up all the resources of the system
and the system come to a halt.
• Password Guessing:
Most hackers crack or guess passwords of
system accounts and gain entry into remote
computer systems.
Eavesdropping
• Unauthorized monitoring of other people's communications is
called Eavesdropping.
• Eavesdropping can be carried out through all communication
devices and media of today-telephone, emails, messaging,
other internet services.
• To prevent this, email messages have to be encrypted and
digital signature are also effective.
Phishing and Pharming
• In Phishing, an imposter uses an authentic looking e-mail or
website to trick recipients into giving out sensitive personal
information which may later used for cyber crimes and frauds.
• Pharming is an attack in which a hacker attempts to redirect a
website’s traffic to another, bogus website. Even if the URL is
correct, it can still be redirect to a fake website.
Cookies
• A Cookie is a small piece of data sent from a website and stored in a user’s
web browser. Some cookies disappears after user closes his browser while
others, know as tracking cookies, remain saved and load the next ime user
visits the same website.
• These cookies help track user’s browsing sessions and load information
faster, but create some security and privacy concerns as well.
These security and privacy concerns are-
1. Session Data : when you visit a website regularly, you may not have to
enter your user name and password to get in because the information is
being pulled from a tracking cookie. If somebody found out the encryption
key and acquired your cookies, he could discover your passwords.
2. Tracking Information : when you visit certain websites with
advertisements, those ads create cookie that store and track your online
patterns.
3. Public Computers : when you work on a public computer in a similar
manner as you work on personal computer, the people who have access
to those computer may access your information also.
Solutions to Computer Security Threat
• The entire computer security is based on a system of
actions and safeguards which have been categorized
in two ways-
1. Active Protection : It includes installing and using
an antivirus that have internet security also which
shows protection against threats such as viruses,
spyware and PC intrusion.
2. Preventive Mesures : Even though security
programs may actively detect and eliminate any
threats your PC encounters, you should always help
to prevent these issues from ever arising.
Solutions to Virus, Adware and Spyware
• Active Protection :
1. Use Anti-Virus and Anti-Spyware.
2. Download updates regularly.
3. Run frequent full-system scans.
• Preventive Measure :
1. Keep your system up-to-date.
2. Use caution when downloading files on the Internet.
3. Be careful with email.
4. Disable cookies, if possible.
Solutions to Spam and Eavesdropping
• Active Protection :
1. Use Anti-Virus.
2. Update your Anti-Virus regularly.
• Preventive Measure :
1. Keep your email address private.
2. Use encryption in emails.
3. Be careful with E-mails.
4. Install Internet security services.
Solution to PC intrusion
• Active Protection :
1. Authorization
2. Authentication
3. Firewall
• Preventive Measure :
1. Use Proper File Access Permission.
2. Disconnect from internet when away.
Solutions to Phishing and pharming attack
• Active Protection :
1. Take the computer offline.
2. Backup all files on the hard drive.
3. List the information given to Phishing scammers.
4. Run Antivirus software.
5. Contact credit agencies to report any possibilities of
identity theft.
• Preventive Measure :
1. Don’t open emails from unknown sources.
2. When in doubt, do not click.
Firewall
• An Internet Firewall is a device or a software that is designed to
protect your computer from data and viruses that you do not want. A
firewall is so called because of the real firewalls used to secure
buildings.
• Software Firewall: A software firewall is a special type of
software running on a computer. It protects your computer from
outside attempts to control or gain access.
• Hardware Firewall: It is a physical piece of equipment
designed to perform firewall duties. A hardware firewall may actually
be another computer or dedicated piece of equipment which serves
as a firewall.

More Related Content

PPTX
Art integrated project of computer science class 12
ANURAGYADAV265
 
PPTX
Virus class 7
Maunishka Malhotra
 
PPTX
Cyber ethics(CBSE Class X), Computer Application
TENZING LHADON
 
PPTX
Virus and antivirus
zain Ul abadin
 
PPTX
Ethics and safety measures in Computing
Ankit Malviya
 
PDF
Class 11 ca chapter 17 computer ethics and cyber crime
Nithilan1
 
PPTX
MALWARE AND ITS TYPES
daniyalqureshi712
 
PPT
Ppt on different types of computer viruses
jnnj
 
Art integrated project of computer science class 12
ANURAGYADAV265
 
Virus class 7
Maunishka Malhotra
 
Cyber ethics(CBSE Class X), Computer Application
TENZING LHADON
 
Virus and antivirus
zain Ul abadin
 
Ethics and safety measures in Computing
Ankit Malviya
 
Class 11 ca chapter 17 computer ethics and cyber crime
Nithilan1
 
MALWARE AND ITS TYPES
daniyalqureshi712
 
Ppt on different types of computer viruses
jnnj
 

What's hot (20)

PPTX
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 
PPTX
Email hacking
ShreyaBhoje
 
PPTX
CYBER SECURITY
Mohammad Shakirul islam
 
PDF
A guide to email spoofing
MattChapman50
 
PPT
Hacking presentation BASIC
Lakkireddy Bali Reddy Collage of Engineering
 
PPTX
Cyber Security
Bhandari Hìmáñßhü
 
PPTX
Cyber Crime and Security
Chitra Mudunuru
 
PPTX
Cyber Safety ppt.pptx
CGC Technical campus,Mohali
 
PPTX
Ethics and safety measures in computing.pptx
Aarush59
 
PPTX
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
PPTX
Ethical hacking
Naveen Sihag
 
PPTX
Cybercrime
Komal003
 
PPTX
Phishing Presentation
Nikolaos Georgitsopoulos
 
PDF
Society law & ethics.pdf
Aditya901507
 
PPTX
Disadvantage of using internet
Muhammad Nazarith
 
PPTX
Firewall presentation
Amandeep Kaur
 
PPTX
Social Networking Security
S. M. Shakib Limon
 
PPTX
Computer Project on Cyber Safety
Harsh Tekriwal
 
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 
Email hacking
ShreyaBhoje
 
CYBER SECURITY
Mohammad Shakirul islam
 
A guide to email spoofing
MattChapman50
 
Cyber Security
Bhandari Hìmáñßhü
 
Cyber Crime and Security
Chitra Mudunuru
 
Cyber Safety ppt.pptx
CGC Technical campus,Mohali
 
Ethics and safety measures in computing.pptx
Aarush59
 
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Ethical hacking
Naveen Sihag
 
Cybercrime
Komal003
 
Phishing Presentation
Nikolaos Georgitsopoulos
 
Society law & ethics.pdf
Aditya901507
 
Disadvantage of using internet
Muhammad Nazarith
 
Firewall presentation
Amandeep Kaur
 
Social Networking Security
S. M. Shakib Limon
 
Computer Project on Cyber Safety
Harsh Tekriwal
 
Ad

Similar to Online access and computer security.pptx_S.Gautham (20)

PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
PPTX
Computer security threats & prevention
PriSim
 
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
olisahchristopher
 
PPT
computer_security.ppt
Asif Raza
 
PPT
Computer security and malware by shahzad younas
Shahzad Younas
 
DOCX
Computer virus
vazhichal12
 
PPTX
Chapter 5.pptx
Wollo UNiversity
 
PPTX
Computer Security Presentation
PraphullaShrestha1
 
PPTX
Computer Scienc-WPS Office.pptx
SriArun9
 
PDF
Type of Security Threats and its Prevention
ijsrd.com
 
PPTX
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
PPSX
csa2014 IBC
apyn
 
PPT
Security
Gopi Nath Gopi
 
PPTX
BCE L-3omputer security Basics.pptx
Kirti Verma
 
PPTX
shubhangi.pptx
SheetalKamble39
 
PPTX
GE9a- Living in the IT Era: Internet Threats.pptx
MarlynLiagao
 
PPTX
Cyber security
Sabir Raja
 
PPTX
Cyber security
ZwebaButt
 
PPTX
Empowerment Technologies Lecture 3 (Philippines SHS)
John Bosco Javellana, MAEd.
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
Computer security threats & prevention
PriSim
 
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
olisahchristopher
 
computer_security.ppt
Asif Raza
 
Computer security and malware by shahzad younas
Shahzad Younas
 
Computer virus
vazhichal12
 
Chapter 5.pptx
Wollo UNiversity
 
Computer Security Presentation
PraphullaShrestha1
 
Computer Scienc-WPS Office.pptx
SriArun9
 
Type of Security Threats and its Prevention
ijsrd.com
 
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
csa2014 IBC
apyn
 
Security
Gopi Nath Gopi
 
BCE L-3omputer security Basics.pptx
Kirti Verma
 
shubhangi.pptx
SheetalKamble39
 
GE9a- Living in the IT Era: Internet Threats.pptx
MarlynLiagao
 
Cyber security
Sabir Raja
 
Cyber security
ZwebaButt
 
Empowerment Technologies Lecture 3 (Philippines SHS)
John Bosco Javellana, MAEd.
 
Ad

Recently uploaded (20)

PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PDF
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PDF
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
CDH. pptx
AneetaSharma15
 
Basics and rules of probability with real-life uses
ravatkaran694
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 

Online access and computer security.pptx_S.Gautham

  • 1. Introduction • We live in a world at a time which is often called InformationAge. • Internet has revolutionized the world and people are getting used to having access to whatever information they want anytime, anywhere. • Unfortunately, this also has resulted in increased security concerns. • This chapter talks about the threats that are associated with online access and the measures to prevent and counter them.
  • 2. Threats to Computer Security • A Threat is a potential violation of security. When a threat is actually executed, it becomes attack. Those who executes such actions, or cause them to be executed are called attackers. • Some common threats the average computer user faces everyday are- 1. Viruses : 2. Worms 3. Trojans 4. Spyware 5. Adware 6. Spamming 7. PC Intrusion: 8. Denial of Service 9. Sweeping 10. Password Guessing 11. Phishing • They are also known as Malware that harms your computer.
  • 3. Computer Viruses • Computer Virus are malicious code/programs that cause damage to data and files on a system. • Virus can attack any part of a computer’s software such as boot sector, operating system, system areas, files, applications-program-macro etc. • Two other similar programs also cause virus like effects. These are- • Worms: a worm is a self replicating program which eats up the entire disk space or memory. A worm keeps on creating its copies until all the disk space or memory is filled. • Trojans Hoursesa A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computerDamages caused by Viruses: – Damage or Delete files. – Slow down your computer. – Invade your email programs.
  • 4. Spyware • Spyware is a software which is installed on your computer to spy on your activities and report this data to people willing to pay for it. • Spyware mostly get installed on your PC without your consent. • Roughly 32% computers of the world are infected with some type of Malware. • Damages caused by Spyware : • Compromises your data, computing habits and identity. – Alter PC settings. – Slow down your PC.
  • 5. Adware • These are the programs that deliver unwanted ads to your computer. They consume your network bandwidth. Adware is similar to spyware. You have to be very careful while installing a software. • Damages caused by Adware: – Adware tracks your information just like spyware. – Displays arrays of advertising. – Slow down your PC.
  • 6. Spamming Spamming refers to the sending of bulk-mail by an identified or unidentified source.in malicious form, the attacker keeps on sending bulk mail until the mail-server runs out of disk space. • Damages caused by Spamming- • Spam reduces productivity. • Spam eats up your time. • Spam can lead to worse things.
  • 7. PC Intrusion Every PC connected to the internet is a potential target for hackers. PC intrusion can occur in any of the following form- • Sweeper Attack : This is another malicious program used by hackers which sweeps all the data from the system. • Denial of Services: This eats up all the resources of the system and the system come to a halt. • Password Guessing: Most hackers crack or guess passwords of system accounts and gain entry into remote computer systems.
  • 8. Eavesdropping • Unauthorized monitoring of other people's communications is called Eavesdropping. • Eavesdropping can be carried out through all communication devices and media of today-telephone, emails, messaging, other internet services. • To prevent this, email messages have to be encrypted and digital signature are also effective. Phishing and Pharming • In Phishing, an imposter uses an authentic looking e-mail or website to trick recipients into giving out sensitive personal information which may later used for cyber crimes and frauds. • Pharming is an attack in which a hacker attempts to redirect a website’s traffic to another, bogus website. Even if the URL is correct, it can still be redirect to a fake website.
  • 9. Cookies • A Cookie is a small piece of data sent from a website and stored in a user’s web browser. Some cookies disappears after user closes his browser while others, know as tracking cookies, remain saved and load the next ime user visits the same website. • These cookies help track user’s browsing sessions and load information faster, but create some security and privacy concerns as well. These security and privacy concerns are- 1. Session Data : when you visit a website regularly, you may not have to enter your user name and password to get in because the information is being pulled from a tracking cookie. If somebody found out the encryption key and acquired your cookies, he could discover your passwords. 2. Tracking Information : when you visit certain websites with advertisements, those ads create cookie that store and track your online patterns. 3. Public Computers : when you work on a public computer in a similar manner as you work on personal computer, the people who have access to those computer may access your information also.
  • 10. Solutions to Computer Security Threat • The entire computer security is based on a system of actions and safeguards which have been categorized in two ways- 1. Active Protection : It includes installing and using an antivirus that have internet security also which shows protection against threats such as viruses, spyware and PC intrusion. 2. Preventive Mesures : Even though security programs may actively detect and eliminate any threats your PC encounters, you should always help to prevent these issues from ever arising.
  • 11. Solutions to Virus, Adware and Spyware • Active Protection : 1. Use Anti-Virus and Anti-Spyware. 2. Download updates regularly. 3. Run frequent full-system scans. • Preventive Measure : 1. Keep your system up-to-date. 2. Use caution when downloading files on the Internet. 3. Be careful with email. 4. Disable cookies, if possible.
  • 12. Solutions to Spam and Eavesdropping • Active Protection : 1. Use Anti-Virus. 2. Update your Anti-Virus regularly. • Preventive Measure : 1. Keep your email address private. 2. Use encryption in emails. 3. Be careful with E-mails. 4. Install Internet security services.
  • 13. Solution to PC intrusion • Active Protection : 1. Authorization 2. Authentication 3. Firewall • Preventive Measure : 1. Use Proper File Access Permission. 2. Disconnect from internet when away.
  • 14. Solutions to Phishing and pharming attack • Active Protection : 1. Take the computer offline. 2. Backup all files on the hard drive. 3. List the information given to Phishing scammers. 4. Run Antivirus software. 5. Contact credit agencies to report any possibilities of identity theft. • Preventive Measure : 1. Don’t open emails from unknown sources. 2. When in doubt, do not click.
  • 15. Firewall • An Internet Firewall is a device or a software that is designed to protect your computer from data and viruses that you do not want. A firewall is so called because of the real firewalls used to secure buildings. • Software Firewall: A software firewall is a special type of software running on a computer. It protects your computer from outside attempts to control or gain access. • Hardware Firewall: It is a physical piece of equipment designed to perform firewall duties. A hardware firewall may actually be another computer or dedicated piece of equipment which serves as a firewall.