SlideShare une entreprise Scribd logo
1  sur  16
CHAPTER 1: INFORMATION
AND COMMUNICATION
TECHNOLOGY
Computer security
Computer Security
Means protecting our computer system and the
information they contains against unwanted access,
damage, destruction or modification.
Computer Threads
Malicious code
   Is a computer program that perform unauthorized processed an a
    computer or network
   There are various kinds of malicious code:
     i)       Virus
     ii)      Trojan horse
     iii)     Logic bomb
     iv)      Trapdoor
     v)       Worm
           Differences between worm and virus are:
                     WORM                                    VIRUS
    Operates through the network             Spreads through any medium
    Spread copies of itself as a stand alone Spread copies of itself as a program
    program                                  that attaches to other program
   A computer infected by a virus, worm or trojan
    horse has one or more of the following symptoms:
       Screen displays unusual message or image
       Music or unusual sound plays randomly
       Available memory is less than expected
       Existing programs and files disappear
       Files become corrupted
Hacking
 Hacking refer to unauthorized access to the

  computer system by a hacker
 A hacker is a person who accessed a computer or

  network illegally
 A cracker also is someone who accessed a

  computer or network illegally but has to intend of
  destroying data, stealing information or other
  malicious action
Nature threads
 Computers are threatened by natural or

  environmental disaster. Be it at home, stores, offices
  and also automobiles
 Examples: flood, fire, earthquakes, storms,

  tornados, excessive heat and inadequate power
Theft
 Two types of theft

    i)     Computer is used to steal money, goods, information
           and resources
    ii)    Stealing of computers especially notebook and PDA
   3 approaches to prevent theft:
    i)     Prevent access by using locks, smart card or
           password
    ii)    Prevent portability by restricting the hardware from
           being moved
    iii)   Detect and guard all exits and record any hardware
Security Measures
   Security measures are measures taken as a
    precaution against theft or espionage or sabotage
    or possible danger or failure
   Usually we use antivirus, cryptography, firewall and
    data backup to protect sensitive information
Anti-virus
 Is a utility program that we use to protect a computer

  against viruses by identifying and removing computer
  viruses found in the computer memory, computer storage or
  incoming e-mails files
 Examples:

                Norton Antivirus
                AVG
                Kaspersky
                Bitdefender
                Nod32
Anti-spyware
 Is a utility program that we use to protect the

  computers from spyware
 Spyware is a software or computer program that is

  designed secretly record and report an individual’s
  activities on the Internet
 Examples:

               Spybot Search and Destroy
               Ad-ware
               Spyware Blaster
Firewall
 Is a piece of hardware or software which functions in

  a networked environment to prevent some
  communications forbidden by security policy
 We use firewall to prevent hacking (access is the

  use of a computer or network without permission)
                                Types of firewall
  SCREENING ROUTERS            PROXY GATEWAY                   GUARD
 simplest                  • some what complex     • most complex
 sees only addresses and   • sees full text of     • sees full text of
service protocol type       communication           communication
Backup
 Is a utility program that makes copy of all files that

  have been saved onto a disk
 Backup data is important when original data is

  corrupted
 When data corrupted, it is spoilt and cannot be

  properly used because it has become changed in
  wrong ways
Cryptography
 Is a process of transforming plaintext into cipheart

  then back again
 Encryption is a process of converting plaintext into

  cipertext. Decryption is the process of converting
  ciphertext into plaintext
 Encryption was used only by intelligence services,

  militaries and banks. We use cryptography to
  secure the information and prevent hacking or
  unauthorized access.
plaintext   encrypt   ciphertext



plaintext   decrypt   ciphertext
Human aspects
 The user and also the intruder of a computer system

 The hardest aspects to give protection

 The most common problem of human aspect security

  is the lack of achieving a good information
  security procedure
ICT CHAPTER 1: COMPUTER SECURITY AND INFORMATION THREATS

Contenu connexe

Tendances

HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000PrakharPrasoon
 
Chapter11
Chapter11Chapter11
Chapter11Izaham
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeDhrumil Panchal
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3Suad 00
 

Tendances (20)

HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter11
Chapter11Chapter11
Chapter11
 
E secuity
E secuityE secuity
E secuity
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
Computer security
Computer securityComputer security
Computer security
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer Crime
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
 

En vedette

PRIMARY STORAGE
PRIMARY STORAGEPRIMARY STORAGE
PRIMARY STORAGEKak Yong
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksKak Yong
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyKak Yong
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programmingKak Yong
 
INPUT DEVICE
INPUT DEVICEINPUT DEVICE
INPUT DEVICEKak Yong
 
PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE Kak Yong
 
SYSTEM CONCEPT
SYSTEM CONCEPTSYSTEM CONCEPT
SYSTEM CONCEPTKak Yong
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICTKak Yong
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsKak Yong
 

En vedette (11)

STORAGE
STORAGESTORAGE
STORAGE
 
HARDWARE
HARDWAREHARDWARE
HARDWARE
 
PRIMARY STORAGE
PRIMARY STORAGEPRIMARY STORAGE
PRIMARY STORAGE
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programming
 
INPUT DEVICE
INPUT DEVICEINPUT DEVICE
INPUT DEVICE
 
PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE
 
SYSTEM CONCEPT
SYSTEM CONCEPTSYSTEM CONCEPT
SYSTEM CONCEPT
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
 

Similaire à ICT CHAPTER 1: COMPUTER SECURITY AND INFORMATION THREATS

Computer security
Computer securityComputer security
Computer securityfiza1975
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2smktsj2
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptxKarthikShivanand
 
SECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptxSECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptxFari84
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 

Similaire à ICT CHAPTER 1: COMPUTER SECURITY AND INFORMATION THREATS (20)

Computer security
Computer securityComputer security
Computer security
 
Notacd02
Notacd02Notacd02
Notacd02
 
Notacd02
Notacd02Notacd02
Notacd02
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2
 
Data security
Data securityData security
Data security
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Computer security and
Computer security andComputer security and
Computer security and
 
Internet security
Internet securityInternet security
Internet security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Computer security
Computer securityComputer security
Computer security
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
SECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptxSECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptx
 
cyber security
cyber security cyber security
cyber security
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 

Plus de Kak Yong

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersifKak Yong
 
Module programming
Module programmingModule programming
Module programmingKak Yong
 
Module info systems
Module info systemsModule info systems
Module info systemsKak Yong
 
Module ict society
Module ict societyModule ict society
Module ict societyKak Yong
 
Module computer systems
Module computer systemsModule computer systems
Module computer systemsKak Yong
 
Module networks
Module networksModule networks
Module networksKak Yong
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaKak Yong
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsKak Yong
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Kak Yong
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Kak Yong
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Kak Yong
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Kak Yong
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Kak Yong
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Kak Yong
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Kak Yong
 
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Kak Yong
 
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01Kak Yong
 
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02Kak Yong
 
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02Kak Yong
 

Plus de Kak Yong (20)

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
 
Module programming
Module programmingModule programming
Module programming
 
Module info systems
Module info systemsModule info systems
Module info systems
 
Module ict society
Module ict societyModule ict society
Module ict society
 
Module computer systems
Module computer systemsModule computer systems
Module computer systems
 
Module networks
Module networksModule networks
Module networks
 
Synopsis
SynopsisSynopsis
Synopsis
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimedia
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02
 
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
 
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
 
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
 
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
 

Dernier

PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEPART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEMISSRITIMABIOLOGYEXP
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Osopher
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...Nguyen Thanh Tu Collection
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroomSamsung Business USA
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptxmary850239
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipKarl Donert
 
DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfChristalin Nelson
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 

Dernier (20)

PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEPART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenship
 
DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdf
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 

ICT CHAPTER 1: COMPUTER SECURITY AND INFORMATION THREATS

  • 1. CHAPTER 1: INFORMATION AND COMMUNICATION TECHNOLOGY Computer security
  • 2. Computer Security Means protecting our computer system and the information they contains against unwanted access, damage, destruction or modification.
  • 3. Computer Threads Malicious code  Is a computer program that perform unauthorized processed an a computer or network  There are various kinds of malicious code: i) Virus ii) Trojan horse iii) Logic bomb iv) Trapdoor v) Worm  Differences between worm and virus are: WORM VIRUS Operates through the network Spreads through any medium Spread copies of itself as a stand alone Spread copies of itself as a program program that attaches to other program
  • 4. A computer infected by a virus, worm or trojan horse has one or more of the following symptoms:  Screen displays unusual message or image  Music or unusual sound plays randomly  Available memory is less than expected  Existing programs and files disappear  Files become corrupted
  • 5. Hacking  Hacking refer to unauthorized access to the computer system by a hacker  A hacker is a person who accessed a computer or network illegally  A cracker also is someone who accessed a computer or network illegally but has to intend of destroying data, stealing information or other malicious action
  • 6. Nature threads  Computers are threatened by natural or environmental disaster. Be it at home, stores, offices and also automobiles  Examples: flood, fire, earthquakes, storms, tornados, excessive heat and inadequate power
  • 7. Theft  Two types of theft i) Computer is used to steal money, goods, information and resources ii) Stealing of computers especially notebook and PDA  3 approaches to prevent theft: i) Prevent access by using locks, smart card or password ii) Prevent portability by restricting the hardware from being moved iii) Detect and guard all exits and record any hardware
  • 8. Security Measures  Security measures are measures taken as a precaution against theft or espionage or sabotage or possible danger or failure  Usually we use antivirus, cryptography, firewall and data backup to protect sensitive information
  • 9. Anti-virus  Is a utility program that we use to protect a computer against viruses by identifying and removing computer viruses found in the computer memory, computer storage or incoming e-mails files  Examples: Norton Antivirus AVG Kaspersky Bitdefender Nod32
  • 10. Anti-spyware  Is a utility program that we use to protect the computers from spyware  Spyware is a software or computer program that is designed secretly record and report an individual’s activities on the Internet  Examples: Spybot Search and Destroy Ad-ware Spyware Blaster
  • 11. Firewall  Is a piece of hardware or software which functions in a networked environment to prevent some communications forbidden by security policy  We use firewall to prevent hacking (access is the use of a computer or network without permission) Types of firewall SCREENING ROUTERS PROXY GATEWAY GUARD  simplest • some what complex • most complex  sees only addresses and • sees full text of • sees full text of service protocol type communication communication
  • 12. Backup  Is a utility program that makes copy of all files that have been saved onto a disk  Backup data is important when original data is corrupted  When data corrupted, it is spoilt and cannot be properly used because it has become changed in wrong ways
  • 13. Cryptography  Is a process of transforming plaintext into cipheart then back again  Encryption is a process of converting plaintext into cipertext. Decryption is the process of converting ciphertext into plaintext  Encryption was used only by intelligence services, militaries and banks. We use cryptography to secure the information and prevent hacking or unauthorized access.
  • 14. plaintext encrypt ciphertext plaintext decrypt ciphertext
  • 15. Human aspects  The user and also the intruder of a computer system  The hardest aspects to give protection  The most common problem of human aspect security is the lack of achieving a good information security procedure