Security
In Computing
INDEX:
What does secure means?
Attacks
Threats
Vulnerabilities
Other exposed assets
Meaning of computer
security
Computer criminals
Methods of defense
Encryption
Controls
Conclusion
WHAT DOES ‘SECURE’
MEANS
Protecting software
Characteristics of computer intrusion
Threats
Vulnerabilities
Controls
A
T
T
A
C
K
S
T
H
R
E
A
T
S
Interception
Interruption
Modification
Fabrication
Vulnerabilities
Hardware vulnerabilities
Software vulnerabilities
1. Software deletion
2. Software modification
3. Software theft
Data vulnerabilities
1. Data confidentiality
2. Data integrity
3. Data availability
Other exposed assets
Networks
Access
Key people
Meaning of computer security
Security goals
Confidentiality
Integrity
Availability
Computer criminals
Amateur
Cracker
Career criminals
Methods of defence
1.Encryption
2. Controls
Encryption
Encryption overview
Human control in
security
Controls
Hardware controls
Software controls
CONCLUSION
Computer security is designed to secure
the following goals-confidentiality
,integrity ,availability
Student interested in security can pursue a
career in it
GROUP MEMBERS:
NILESH JAISWAR

More Related Content

PDF
Presentation on Network Security
PPTX
What is network security and Types
PDF
Linux Security best Practices with Fedora
PDF
Cyber security slideshare_oct_2020
PPTX
System Security-Chapter 1
PPTX
Basic Security Concepts of Computer
PPTX
06. security concept
PPTX
It security
Presentation on Network Security
What is network security and Types
Linux Security best Practices with Fedora
Cyber security slideshare_oct_2020
System Security-Chapter 1
Basic Security Concepts of Computer
06. security concept
It security

What's hot (20)

PPTX
Presentation1 new (1) (1)cf
PPTX
Computer Security
PPTX
Software Security
PPT
Basic Security Chapter 1
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
PDF
Computer Network Security
PPTX
Network Security Issues
PPTX
Modern Network Security Issue and Challenge
PPTX
Network Security and Firewall
PPT
Introduction To Computer Security
PPTX
23 network security threats pkg
PPTX
Computer security
PPTX
Network Security Goals
PPTX
Network security
PDF
Computer Security Lecture 1: Overview
PPTX
Network Security
PPTX
Network security
PPTX
Firewalls in network security
PPTX
NETWORK SECURITY
PPTX
Network security
Presentation1 new (1) (1)cf
Computer Security
Software Security
Basic Security Chapter 1
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Computer Network Security
Network Security Issues
Modern Network Security Issue and Challenge
Network Security and Firewall
Introduction To Computer Security
23 network security threats pkg
Computer security
Network Security Goals
Network security
Computer Security Lecture 1: Overview
Network Security
Network security
Firewalls in network security
NETWORK SECURITY
Network security
Ad

Similar to Security (20)

PPTX
Information Assurance and Security Demonstration
PPT
software-security.ppt
PPT
software-security-intro-220901084730-8ed673b9.ppt
PPTX
Unit-I PPT.pptx
PPTX
Software Security and Future trends.pptx
PPTX
Network security
PPTX
Cyber Security: A Hands on review
DOCX
Network security
PPTX
network security.001.pptx................
PDF
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
PPTX
Information-security and best pracrices tools for the enhanced security of s...
PPT
Network security presentation
PPT
Essentials Of Security
 
DOCX
cybersecurity 101 conducted by GDG on campus SUIIT
PPTX
Information Security introduction and management.pptx
PPTX
Software Security and Trusted Systems.pptx
PPTX
INTRODUCTION CB start Cyber Security.pptx
PPTX
Information_Security_Lecturenotes_1.pptx
PPT
Ch01_Introduction_to_Information_Securit.ppt
PPT
Ch01_Introduction_to_Information_Securit.ppt
Information Assurance and Security Demonstration
software-security.ppt
software-security-intro-220901084730-8ed673b9.ppt
Unit-I PPT.pptx
Software Security and Future trends.pptx
Network security
Cyber Security: A Hands on review
Network security
network security.001.pptx................
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
Information-security and best pracrices tools for the enhanced security of s...
Network security presentation
Essentials Of Security
 
cybersecurity 101 conducted by GDG on campus SUIIT
Information Security introduction and management.pptx
Software Security and Trusted Systems.pptx
INTRODUCTION CB start Cyber Security.pptx
Information_Security_Lecturenotes_1.pptx
Ch01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.ppt
Ad

More from nil65 (9)

PPTX
Selenium
PPTX
Software testing
PPTX
software testing on whatsapp
PPT
Software project management
PPT
Wifi
PPT
multimedia mpeg-7
PPT
Linux intro to advance
PPT
Gps
PPTX
Dss
Selenium
Software testing
software testing on whatsapp
Software project management
Wifi
multimedia mpeg-7
Linux intro to advance
Gps
Dss

Recently uploaded (20)

PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
The AI Revolution in Customer Service - 2025
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PPTX
Microsoft User Copilot Training Slide Deck
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
SaaS reusability assessment using machine learning techniques
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
MuleSoft-Compete-Deck for midddleware integrations
Early detection and classification of bone marrow changes in lumbar vertebrae...
Co-training pseudo-labeling for text classification with support vector machi...
Auditboard EB SOX Playbook 2023 edition.
Advancing precision in air quality forecasting through machine learning integ...
The AI Revolution in Customer Service - 2025
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Connector Corner: Transform Unstructured Documents with Agentic Automation
Microsoft User Copilot Training Slide Deck
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Basics of Cloud Computing - Cloud Ecosystem
EIS-Webinar-Regulated-Industries-2025-08.pdf
SaaS reusability assessment using machine learning techniques
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Module 1 Introduction to Web Programming .pptx
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
A symptom-driven medical diagnosis support model based on machine learning te...
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf

Security