0% found this document useful (0 votes)
15 views

LECTURE DCS 2

Computer security, also known as IT security, is essential for protecting computer systems, networks, and data from unauthorized access and cyber threats. It encompasses various types of security measures, including cyber security, application security, and network security, to safeguard against cybercrime and attacks such as malware, phishing, and identity theft. To ensure computer security, users should adopt practices like keeping software updated, using secure connections, and being cautious with personal information.

Uploaded by

sefuhasani2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

LECTURE DCS 2

Computer security, also known as IT security, is essential for protecting computer systems, networks, and data from unauthorized access and cyber threats. It encompasses various types of security measures, including cyber security, application security, and network security, to safeguard against cybercrime and attacks such as malware, phishing, and identity theft. To ensure computer security, users should adopt practices like keeping software updated, using secure connections, and being cautious with personal information.

Uploaded by

sefuhasani2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

COMPUTER SECURITY

Computer security, also known as IT security or information security,


encompasses the protection of computer systems, networks, and data from
unauthorized access, theft, damage, or disruption. It involves implementing
various measures and controls to ensure the confidentiality, integrity, and
availability of information and resources stored or processed on computer
systems.
COMPUTER SECURITY

Why is computer system security needed?


Computer system security is necessary to protect an
organization's assets from the threat of attacks. These assets
consist of hardware, software, personnel, and facilities.
COMPUTER SECURITY

In other words
Computer security refers to protecting and securing computers
and their related data, networks, software, hardware from
unauthorized access, misuse, theft, information loss, and other
security issues. The Internet has made our lives easier and has
provided us with lots of advantages but it has also put our
system’s security at risk of being infected by a virus, of being
hacked, information theft, damage to the system, and much
more.
COMPUTER SECURITY

Technology is growing day by day and the entire world is in its grasp. We
cannot imagine even a day without electronic devices around us. With the use
of this growing technology, invaders, hackers and thieves are trying to harm
our computer’s security for monetary gains, recognition purposes, ransom
demands, bullying others, invading into other businesses, organizations, etc.
In order to protect our system from all these risks, computer security is
important.
COMPUTER SECURITY

Types of Computer Security

 Cyber Security
 Application Security
 Information Security
 Network Security
 Endpoint Security
 Internet Security
COMPUTER SECURITY

Types of Computer Security

Cyber Security
Cyber security means securing our computers, electronic
devices, networks , programs, systems from cyber attacks.
Cyber attacks are those attacks that happen when our system is
connected to the Internet.
COMPUTER SECURITY

Cyber Security
In other words
Cybersecurity refers to the practice of protecting computer
systems, networks, and data from digital attacks. These attacks
often aim to access, steal, or damage sensitive information or
disrupt normal business operations. Cybersecurity measures
include a range of techniques, technologies, and practices
designed to safeguard digital assets.
COMPUTER SECURITY

Types of cyber threats/attacks


Cybercrime
Includes single actors or groups targeting systems for financial
gain or to cause disruption.
Cybercrime is criminal activity that either targets or uses a
computer, a computer network or a networked device. Most
cybercrime is committed by cybercriminals or hackers who want
to make money. However, occasionally cybercrime aims to
damage computers or networks for reasons other than profit.
These could be political or personal.
COMPUTER SECURITY

Cybercrime can be carried out by individuals or organizations.


Some cybercriminals are organized, use advanced techniques and
are highly technically skilled. Others are novice hackers.

Cybercrime is any criminal activity that involves a computer,


network or networked device.
COMPUTER SECURITY

Cont...
While most cybercriminals use cybercrimes to generate a profit,
some cybercrimes are carried out against computers or devices to
directly damage or disable them. Others use computers or
networks to spread malware, illegal information, images or other
materials.
Some cybercrimes do both -- i.e., target computers to infect them
with a computer virus, which is then spread to other machines
and, sometimes, entire networks.
COMPUTER SECURITY

What exactly is cybercrime?


Cybercrime refers to illegal actions using computers or the
internet.
Some examples of cybercrime include:
 Stealing and selling corporate data
 Demanding payment to prevent an attack
 Installing viruses on a targeted computer
 Hacking into government or corporate computers
COMPUTER SECURITY

Types of cyber attack/crime


Malware Attacks:
Malware is made up of two terms: Malicious + Software =
Malware.
Malicious software (malware) is designed to disrupt, damage, or
gain unauthorized access to computer systems or data.
There are different types of malwares such as computer viruses,
spyware, ransomware, worms, Trojan horses, adware,
ransomware, or any type of malicious code.
COMPUTER SECURITY

Types of cyber attack

Phishing:
Phishing involves tricking individuals into revealing sensitive
information, such as passwords, credit card numbers, or personal
data, by posing as a trustworthy entity in electronic
communication (e.g., email, text messages, or fake websites).
COMPUTER SECURITY

Identity Theft:
Cybercriminals steal personal information, such as Social
Security numbers, credit card numbers, or bank account details,
to impersonate individuals or commit financial fraud.

Hacking:
Unauthorized access to computer systems or networks to steal
information, disrupt operations, or cause damage. This can
include exploiting software vulnerabilities, brute force attacks, or
using stolen credentials.
COMPUTER SECURITY

Cyber Extortion:
Cybercriminals demand payment or threaten to release sensitive
information, launch a cyberattack, or damage systems unless a
ransom is paid.
COMPUTER SECURITY

Distributed Denial of Service (DDoS) Attacks:


DDoS attacks overwhelm a target system or network with a flood
of traffic, rendering it inaccessible to legitimate users.

Data Breaches:
Unauthorized access to sensitive data stored on computer systems
or networks, often resulting in the exposure of personal or
confidential information.
COMPUTER SECURITY

Online Scams and Fraud:


Various scams, such as online auctions fraud, investment fraud, romance
scams, and fake antivirus scams, deceive victims into providing money or
valuable information.

How can you avoid online scam

Cyberbullying and Online Harassment:


Using digital platforms to harass, intimidate, or threaten individuals, often
through social media, email, or messaging apps.
COMPUTER SECURITY

Steps to ensure computer security


In order to protect our system from the above-mentioned attacks,
users should take certain steps to ensure system security:
 Always keep your Operating System up to date.
 Always use a secure network connection.
 Always install an Antivirus and keep it up to date.
 Enable firewall.
 Use strong passwords.
 Don’t trust someone easily.
COMPUTER SECURITY

Steps to ensure computer security


 Keep your personal information hidden
 Don’t download attachments that come along with e-mails
unless and until you know that e-mail is from a genuine
source. Mostly, these attachments contain malware which,
upon execution infect or harms your system.
 Learn about computer security and ethics
COMPUTER SECURITY

Steps to ensure computer security


 Don’t use pirated content.
Often, people try to download pirated movies, videos or web
series in order to get them for free. These pirated content are at
major risk of being infected with viruses, worms, or malware, and
when you download them you end up compromising your system
security.
END

You might also like