SlideShare une entreprise Scribd logo
1  sur  26
4.0 COMPUTER ETHICS
AND SECURITY
  4.2 Computer Security
     4.2.1 Computer Security Risks
LEARNING OUTCOMES:
 At the end of this topic, students should
  be able to:
        Define computer security risks.
        Identify types of security risks.




                                              2
DEFINITION

 Computer Security Risks

Definition : is any event or action that
could cause a loss of or damage to
computer hardware, software, data,
information, or processing capability.



                                           3
Types of Computer Security Risks
Types of Computer Security Risks
                  Internet and network
                   Internet and network
                          attack
                          attack
               Unauthorized access and use
               Unauthorized access and use

                     Hardware theft
                     Hardware theft

                     Software theft
                      Software theft

                    Information theft
                     Information theft

                     System failure
                     System failure
                                             5
Internet and network attacks
• Information transmitted over networks has a
  higher degree of security risk than information
  kept on an organization’s premises.
1. Malware
 1. Malware                          5. Spoofing
                                     5. Spoofing




              Internet and
             network attacks

2. Botnets
2. Botnets                 4. Denial of service attacks
                           4. Denial of service attacks


                                                    7
                3. Back Doors
                3. Back Doors
Malware
    Malware (malicious software) – which are program
     that act without a user’s knowledge and deliberately
     alter the computer operation.
 Type of malware:

i. Computer viruses

ii. Worms

iii. Trojan Horses

iv. Rootkit

v. Back door

vi. Spyware
Malware
                                  Symptoms Malware
•• Operating   system runs much slower than usual
• Available memory is less than expected
• Files become corrupted
• Screen displays unusual message or image
• Music or unusual sound plays randomly
• Existing programs and files disappear

                                              9
Malware
                                 Symptoms Malware

• Programs or files do not work properly
• Unknown programs or files mysteriously appear
• System properties change
• Operating system does not start up
• Operating system shuts down unexpectedly



                                             10
Malware
                                         1. Worm



Definition :
Worm is a program that copies itself repeatedly,
for example in memory or on a network, using up
resources and possibly shutting down the
computer or network.



                                           11
Malware
                                2. Computer Virus


Definition :
Computer virus is a potentially damaging computer
program that affects, or infects, a computer
negatively by altering the way the computer works
without the user’s knowledge or permission.




                                             12
Malware
                             2. Computer Virus


 it can spread throughout and may damage files
and system software, including the operating
system.




                                         13
Internet and network attacks
               Malware
                                3. Trojan horse



Definition :
Trojan horse is a program that hides within or
looks like a legitimate program. It does not
replicate itself to other computers.




                                           14
Internet and network attacks
                 Malware
                                3. Trojan horse


 it can spread throughout and may damage files
and system software, including the operating
system.




                                          15
Internet and network attacks
                 Malware
                                    4. Rootkit


 Definition :
 Is a program that hides in a computer and allows
 someone from a remote location to take full control
 of the computer.
The rootkit author can execute programs, change
settings, monitor activity, and access files on the
remote computer

                                            16
Internet and network attacks
               Malware
                        5. Spyware & Adware


 Spyware is a program placed on a computer
without the users knowledge that secretly collects
information about the user.

 Adware is a program that displays an online
advertisement in a banner or pop-up window on
web pages, e-mail messages or other internet
services
                                          17
Botnets
Definition :
  a group of compromised computers connected to a
  network such as the Internet that are used as part of
  a network that attacks other networks, usually for
  nefarious purposes.
Back Door
Definition :
 A program or set of instructions in a program that allow users
 to bypass security controls when accessing a program,
 computer, or network
Denial of Service Attacks
Definition :
     Denial of service attacks or DoS attack, is an assault whose
     purpose is to disrupt computer access to an Internet
     service such as the Web or e-mail.
Spoofing
Definition :
       A technique intruders use to make their network or
 Internet transmission appear legitimate to a victim computer
 or network.
Unauthorized Access and Use

                 Unauthorized access
The use of a computer or network without permission.


                  Unauthorized use
The use of a computer or its data for unapproved or
 possibly illegal activities.
Hardware Theft and Vandalism

                Hardware theft
Is the act of stealing computer equipment.


             Hardware vandalism
The act of defacing or destroying computer
 equipment.
Software Theft
Information Theft



Occurs when someone steals personal or
confidential information.
If stolen, the loss of information can cause as
much damage as (if not more than) hardware or
software theft.
System Failure



A system failure is the prolonged malfunction of a
computer
A variety of factors can lead to system failure,
including:
   Aging hardware
   Natural disasters
   Electrical power problems
      Noise, undervoltages, and overvoltages
   Errors in computer programs

Contenu connexe

Tendances

Tendances (20)

Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network security
Network securityNetwork security
Network security
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Computer security
Computer securityComputer security
Computer security
 
Network security
Network securityNetwork security
Network security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Software and Networking tools
Software and Networking toolsSoftware and Networking tools
Software and Networking tools
 
Network security
Network securityNetwork security
Network security
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ppt
PptPpt
Ppt
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similaire à 3.2.1 computer security risks

RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Anna Stirling
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimenidhidgowda185
 
Digital Security Risk.pptx
Digital Security Risk.pptxDigital Security Risk.pptx
Digital Security Risk.pptxAdrianVANTOPINA
 
CH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallyCH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallySukanya Ben
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 

Similaire à 3.2.1 computer security risks (20)

RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
computer security
computer securitycomputer security
computer security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
It ppt new
It ppt newIt ppt new
It ppt new
 
Digital Security Risk.pptx
Digital Security Risk.pptxDigital Security Risk.pptx
Digital Security Risk.pptx
 
TIC
TICTIC
TIC
 
CH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallyCH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and Ethically
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network security
Network securityNetwork security
Network security
 
Internet security
Internet securityInternet security
Internet security
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Computer securety
Computer securetyComputer securety
Computer securety
 

Plus de hazirma

2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquettehazirma
 
2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of websitehazirma
 
2.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.42.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.4hazirma
 
2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isphazirma
 
2.2.1.1 evolution of internet
2.2.1.1 evolution of internet2.2.1.1 evolution of internet
2.2.1.1 evolution of internethazirma
 
2.1.1 network topology
2.1.1 network topology2.1.1 network topology
2.1.1 network topologyhazirma
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of websitehazirma
 
Tutorial pdt sem 1
Tutorial pdt sem 1Tutorial pdt sem 1
Tutorial pdt sem 1hazirma
 
3.1.1 computer ethics
3.1.1 computer ethics3.1.1 computer ethics
3.1.1 computer ethicshazirma
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measureshazirma
 
2.3 the internet services
2.3 the internet services2.3 the internet services
2.3 the internet serviceshazirma
 
2.5 Netiquette
2.5 Netiquette2.5 Netiquette
2.5 Netiquettehazirma
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of websitehazirma
 
C topic 3.3 the internet services 2
C topic 3.3 the internet services 2C topic 3.3 the internet services 2
C topic 3.3 the internet services 2hazirma
 
2.2.2.4 Information Searching
2.2.2.4 Information Searching2.2.2.4 Information Searching
2.2.2.4 Information Searchinghazirma
 
2.2.2.2 Web Address
2.2.2.2 Web Address2.2.2.2 Web Address
2.2.2.2 Web Addresshazirma
 
2.2.2.1 Web Browser
2.2.2.1 Web Browser2.2.2.1 Web Browser
2.2.2.1 Web Browserhazirma
 
2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizahhazirma
 
2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigationhazirma
 
2.2.1.2 The Internet Connection
2.2.1.2 The Internet Connection 2.2.1.2 The Internet Connection
2.2.1.2 The Internet Connection hazirma
 

Plus de hazirma (20)

2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette
 
2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website
 
2.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.42.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.4
 
2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp
 
2.2.1.1 evolution of internet
2.2.1.1 evolution of internet2.2.1.1 evolution of internet
2.2.1.1 evolution of internet
 
2.1.1 network topology
2.1.1 network topology2.1.1 network topology
2.1.1 network topology
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of website
 
Tutorial pdt sem 1
Tutorial pdt sem 1Tutorial pdt sem 1
Tutorial pdt sem 1
 
3.1.1 computer ethics
3.1.1 computer ethics3.1.1 computer ethics
3.1.1 computer ethics
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
2.3 the internet services
2.3 the internet services2.3 the internet services
2.3 the internet services
 
2.5 Netiquette
2.5 Netiquette2.5 Netiquette
2.5 Netiquette
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of website
 
C topic 3.3 the internet services 2
C topic 3.3 the internet services 2C topic 3.3 the internet services 2
C topic 3.3 the internet services 2
 
2.2.2.4 Information Searching
2.2.2.4 Information Searching2.2.2.4 Information Searching
2.2.2.4 Information Searching
 
2.2.2.2 Web Address
2.2.2.2 Web Address2.2.2.2 Web Address
2.2.2.2 Web Address
 
2.2.2.1 Web Browser
2.2.2.1 Web Browser2.2.2.1 Web Browser
2.2.2.1 Web Browser
 
2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah
 
2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation
 
2.2.1.2 The Internet Connection
2.2.1.2 The Internet Connection 2.2.1.2 The Internet Connection
2.2.1.2 The Internet Connection
 

3.2.1 computer security risks

  • 1. 4.0 COMPUTER ETHICS AND SECURITY 4.2 Computer Security 4.2.1 Computer Security Risks
  • 2. LEARNING OUTCOMES:  At the end of this topic, students should be able to:  Define computer security risks.  Identify types of security risks. 2
  • 3. DEFINITION Computer Security Risks Definition : is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. 3
  • 4. Types of Computer Security Risks
  • 5. Types of Computer Security Risks Internet and network Internet and network attack attack Unauthorized access and use Unauthorized access and use Hardware theft Hardware theft Software theft Software theft Information theft Information theft System failure System failure 5
  • 6. Internet and network attacks • Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises.
  • 7. 1. Malware 1. Malware 5. Spoofing 5. Spoofing Internet and network attacks 2. Botnets 2. Botnets 4. Denial of service attacks 4. Denial of service attacks 7 3. Back Doors 3. Back Doors
  • 8. Malware  Malware (malicious software) – which are program that act without a user’s knowledge and deliberately alter the computer operation.  Type of malware: i. Computer viruses ii. Worms iii. Trojan Horses iv. Rootkit v. Back door vi. Spyware
  • 9. Malware Symptoms Malware •• Operating system runs much slower than usual • Available memory is less than expected • Files become corrupted • Screen displays unusual message or image • Music or unusual sound plays randomly • Existing programs and files disappear 9
  • 10. Malware Symptoms Malware • Programs or files do not work properly • Unknown programs or files mysteriously appear • System properties change • Operating system does not start up • Operating system shuts down unexpectedly 10
  • 11. Malware 1. Worm Definition : Worm is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network. 11
  • 12. Malware 2. Computer Virus Definition : Computer virus is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. 12
  • 13. Malware 2. Computer Virus  it can spread throughout and may damage files and system software, including the operating system. 13
  • 14. Internet and network attacks Malware 3. Trojan horse Definition : Trojan horse is a program that hides within or looks like a legitimate program. It does not replicate itself to other computers. 14
  • 15. Internet and network attacks Malware 3. Trojan horse  it can spread throughout and may damage files and system software, including the operating system. 15
  • 16. Internet and network attacks Malware 4. Rootkit Definition : Is a program that hides in a computer and allows someone from a remote location to take full control of the computer. The rootkit author can execute programs, change settings, monitor activity, and access files on the remote computer 16
  • 17. Internet and network attacks Malware 5. Spyware & Adware  Spyware is a program placed on a computer without the users knowledge that secretly collects information about the user.  Adware is a program that displays an online advertisement in a banner or pop-up window on web pages, e-mail messages or other internet services 17
  • 18. Botnets Definition : a group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
  • 19. Back Door Definition : A program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network
  • 20. Denial of Service Attacks Definition : Denial of service attacks or DoS attack, is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.
  • 21. Spoofing Definition : A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
  • 22. Unauthorized Access and Use Unauthorized access The use of a computer or network without permission. Unauthorized use The use of a computer or its data for unapproved or possibly illegal activities.
  • 23. Hardware Theft and Vandalism Hardware theft Is the act of stealing computer equipment. Hardware vandalism The act of defacing or destroying computer equipment.
  • 25. Information Theft Occurs when someone steals personal or confidential information. If stolen, the loss of information can cause as much damage as (if not more than) hardware or software theft.
  • 26. System Failure A system failure is the prolonged malfunction of a computer A variety of factors can lead to system failure, including: Aging hardware Natural disasters Electrical power problems Noise, undervoltages, and overvoltages Errors in computer programs