LECTURE DCS 2
LECTURE DCS 2
In other words
Computer security refers to protecting and securing computers
and their related data, networks, software, hardware from
unauthorized access, misuse, theft, information loss, and other
security issues. The Internet has made our lives easier and has
provided us with lots of advantages but it has also put our
system’s security at risk of being infected by a virus, of being
hacked, information theft, damage to the system, and much
more.
COMPUTER SECURITY
Technology is growing day by day and the entire world is in its grasp. We
cannot imagine even a day without electronic devices around us. With the use
of this growing technology, invaders, hackers and thieves are trying to harm
our computer’s security for monetary gains, recognition purposes, ransom
demands, bullying others, invading into other businesses, organizations, etc.
In order to protect our system from all these risks, computer security is
important.
COMPUTER SECURITY
Cyber Security
Application Security
Information Security
Network Security
Endpoint Security
Internet Security
COMPUTER SECURITY
Cyber Security
Cyber security means securing our computers, electronic
devices, networks , programs, systems from cyber attacks.
Cyber attacks are those attacks that happen when our system is
connected to the Internet.
COMPUTER SECURITY
Cyber Security
In other words
Cybersecurity refers to the practice of protecting computer
systems, networks, and data from digital attacks. These attacks
often aim to access, steal, or damage sensitive information or
disrupt normal business operations. Cybersecurity measures
include a range of techniques, technologies, and practices
designed to safeguard digital assets.
COMPUTER SECURITY
Cont...
While most cybercriminals use cybercrimes to generate a profit,
some cybercrimes are carried out against computers or devices to
directly damage or disable them. Others use computers or
networks to spread malware, illegal information, images or other
materials.
Some cybercrimes do both -- i.e., target computers to infect them
with a computer virus, which is then spread to other machines
and, sometimes, entire networks.
COMPUTER SECURITY
Phishing:
Phishing involves tricking individuals into revealing sensitive
information, such as passwords, credit card numbers, or personal
data, by posing as a trustworthy entity in electronic
communication (e.g., email, text messages, or fake websites).
COMPUTER SECURITY
Identity Theft:
Cybercriminals steal personal information, such as Social
Security numbers, credit card numbers, or bank account details,
to impersonate individuals or commit financial fraud.
Hacking:
Unauthorized access to computer systems or networks to steal
information, disrupt operations, or cause damage. This can
include exploiting software vulnerabilities, brute force attacks, or
using stolen credentials.
COMPUTER SECURITY
Cyber Extortion:
Cybercriminals demand payment or threaten to release sensitive
information, launch a cyberattack, or damage systems unless a
ransom is paid.
COMPUTER SECURITY
Data Breaches:
Unauthorized access to sensitive data stored on computer systems
or networks, often resulting in the exposure of personal or
confidential information.
COMPUTER SECURITY