SlideShare une entreprise Scribd logo
1  sur  22
Computer Security
by Antonio González Carcavilla
What is Computer Security?
• is a branch of computer technology
• known as “Information Security”
• applied to computers and networks
• the objective is to protect information and property
from theft, corruption, or natural disaster
Risks & Threatening
• Malware • Social Engineering
Malware
Consists of programming designed to:
•disrupt or deny operation
•gather information that leads to loss of privacy or
exploitation
•or gain unauthorized access to system resources
Examples of Malware
• Virus
• Trojans
• Bots and botnets
• Spyware
Virus
• programs that alter the functioning of our computer
without our knowledge obtaining or destroying
information
• spread by direct contact or sharing the same medium
Trojans
• viruses disguise as programs that supposedly do
something but actually open a door on our
computer so it can be accessed from outside
• his name comes from The Trojan Horse
Bots or Robots
• is a type of trojan that use our computer to
connect to other infected computers (zombies)
• the goal is create botnets or zombie networks
• enables to send mass mailings without be detected
Spyware
• collects small pieces of information about users
without their knowledge
• search for email adress, IP address, pages visited,...
• the presence of spyware is typically hidden from
the user, and can be difficult to detect
What is the propose?
How to get money?
• directly:
getting our bank
access: phising
• indirectly:
renting zombie networks
for illegal purposes
Social Engineering
• The art of manipulating people into
performing actions or divulging confidential
information.
Examples of Social Engineering
• Spam
• Hoax
• Phising
Spam
• is the use of electronic messaging systems to send
unsolicited bulk messages indiscriminately
• the most widely recognized form of spam is
e-mail spam
Hoax
• is a message warning the recipient of a non-existent
computer virus threat
• the message is usually a chain e-mail
• are usually harmless
Phishing
• a way of attempting to acquire information such as
usernames, passwords, and credit card details by
masquerading as a trustworthy entity in an electronic
communication
HowTo defend against
Social Engineering?
• don’t share relevant information
• ensure that access the site you want
• change the password regularly
"If something seems too good to be true, it probably isn’t"
Safe Passwords
There are two rules to enforce good passwords:
• easy to remember
• not a word in the dictionary
Safe Passwords
How to create passwords easy to remember
• find a personal “algorithm” for generating
obscure passwords
• use sayings, poems or famous quotes
Safe Passwords
Example:
Kill Two Birds With One
Stone 
take the first letter of each word and change the numbers in figures:
K___ 2 B____ W___ 1 S____
“k2bw1s”
Safe Passwords
Other examples:
 “2habt1” 
 “1ysm7yw” 
 “2icb3iac” 
“abithiw2itb”  
“str&stc”   
“w&pup4ure”
Two Heads Are Better Than One
One year's seeding makes seven years weeding
Two is company but three is a crowd
A bird in the hand is worth two in the bush
Spare the rod and spoil the child
Walnuts and Pears You Plant For Your Ears

Contenu connexe

Tendances

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

Tendances (20)

Security threats
Security threatsSecurity threats
Security threats
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Web security
Web securityWeb security
Web security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 

En vedette

En vedette (8)

Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Similaire à Computer security

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 

Similaire à Computer security (20)

Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Hacking
HackingHacking
Hacking
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Crontab Cyber Security session 4
Crontab Cyber Security session 4Crontab Cyber Security session 4
Crontab Cyber Security session 4
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the Internet
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Computer security

  • 1.
  • 2. Computer Security by Antonio González Carcavilla
  • 3. What is Computer Security? • is a branch of computer technology • known as “Information Security” • applied to computers and networks • the objective is to protect information and property from theft, corruption, or natural disaster
  • 4. Risks & Threatening • Malware • Social Engineering
  • 5. Malware Consists of programming designed to: •disrupt or deny operation •gather information that leads to loss of privacy or exploitation •or gain unauthorized access to system resources
  • 6. Examples of Malware • Virus • Trojans • Bots and botnets • Spyware
  • 7. Virus • programs that alter the functioning of our computer without our knowledge obtaining or destroying information • spread by direct contact or sharing the same medium
  • 8. Trojans • viruses disguise as programs that supposedly do something but actually open a door on our computer so it can be accessed from outside • his name comes from The Trojan Horse
  • 9. Bots or Robots • is a type of trojan that use our computer to connect to other infected computers (zombies) • the goal is create botnets or zombie networks • enables to send mass mailings without be detected
  • 10. Spyware • collects small pieces of information about users without their knowledge • search for email adress, IP address, pages visited,... • the presence of spyware is typically hidden from the user, and can be difficult to detect
  • 11. What is the propose?
  • 12. How to get money? • directly: getting our bank access: phising • indirectly: renting zombie networks for illegal purposes
  • 13. Social Engineering • The art of manipulating people into performing actions or divulging confidential information.
  • 14. Examples of Social Engineering • Spam • Hoax • Phising
  • 15. Spam • is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately • the most widely recognized form of spam is e-mail spam
  • 16. Hoax • is a message warning the recipient of a non-existent computer virus threat • the message is usually a chain e-mail • are usually harmless
  • 17. Phishing • a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication
  • 18. HowTo defend against Social Engineering? • don’t share relevant information • ensure that access the site you want • change the password regularly "If something seems too good to be true, it probably isn’t"
  • 19. Safe Passwords There are two rules to enforce good passwords: • easy to remember • not a word in the dictionary
  • 20. Safe Passwords How to create passwords easy to remember • find a personal “algorithm” for generating obscure passwords • use sayings, poems or famous quotes
  • 21. Safe Passwords Example: Kill Two Birds With One Stone  take the first letter of each word and change the numbers in figures: K___ 2 B____ W___ 1 S____ “k2bw1s”
  • 22. Safe Passwords Other examples:  “2habt1”   “1ysm7yw”   “2icb3iac”  “abithiw2itb”   “str&stc”    “w&pup4ure” Two Heads Are Better Than One One year's seeding makes seven years weeding Two is company but three is a crowd A bird in the hand is worth two in the bush Spare the rod and spoil the child Walnuts and Pears You Plant For Your Ears