SlideShare une entreprise Scribd logo
1  sur  6
1.2 Security
[object Object]
It is used to protect information and property from theft, corruption or natural disaster, while at the same time allowing the information and property to remain accessible for its intended users.,[object Object]
2. Exploits ,[object Object],Examples include: -Trojans: malware* that facilitates unauthorized access  -Viruses and worms: Computer program that copies itself and infects a computer -Denial of service: Attempt to make a computer resource unavailable to its intended users *= software designed to infiltrate a computer system without the owner knowing
3. Payload ,[object Object],Other examples: -Backdoor: method of securing remote access to a computer -Root kit: software that hides the hackers presence from administrators -Key logging: action of tracking the keys struck on a keyboard, typically done in way that the user is unaware he’s being monitored.
Ways of protecting computers/networks ,[object Object]

Contenu connexe

Tendances

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber securityBansari Shah
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information systemNimisha Walecha
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Cybersecurity
CybersecurityCybersecurity
CybersecuritySabiha M
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attackstechexpert2345
 
امن الشبكات ccnas
امن الشبكات ccnasامن الشبكات ccnas
امن الشبكات ccnasrami alamoudi
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityarun alfie
 

Tendances (19)

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer security
Computer securityComputer security
Computer security
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Worm
WormWorm
Worm
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
امن الشبكات ccnas
امن الشبكات ccnasامن الشبكات ccnas
امن الشبكات ccnas
 
CCNAS Ch01
CCNAS Ch01 CCNAS Ch01
CCNAS Ch01
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 

En vedette

OEM International Årstämma 2010
OEM International Årstämma 2010OEM International Årstämma 2010
OEM International Årstämma 2010OEMInternational
 
Applying social media strategy for clinicians and researchers
Applying social media strategy for clinicians and researchersApplying social media strategy for clinicians and researchers
Applying social media strategy for clinicians and researchersHeidi Allen
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Duane Blackburn
 
Presentation1
Presentation1Presentation1
Presentation1andrewaja
 
Dibujos de movil
Dibujos de movilDibujos de movil
Dibujos de movilcpremolino
 
Challenges of AJAX Development for Smartphone Platforms
Challenges of AJAX Development for Smartphone PlatformsChallenges of AJAX Development for Smartphone Platforms
Challenges of AJAX Development for Smartphone PlatformsMaxMotovilov
 
Horizon News Print and Digital Overview
Horizon News Print and Digital Overview Horizon News Print and Digital Overview
Horizon News Print and Digital Overview Beth Spallone
 
Digital Design _ a1
Digital Design _ a1Digital Design _ a1
Digital Design _ a1blitzz
 
23205052
2320505223205052
23205052radgirl
 
חדש 2010 משפט ציבורי מצגת 06.12
חדש 2010 משפט ציבורי מצגת 06.12חדש 2010 משפט ציבורי מצגת 06.12
חדש 2010 משפט ציבורי מצגת 06.12elio2b
 
Voluntary Benefits Portfolio 1.09
Voluntary Benefits Portfolio 1.09Voluntary Benefits Portfolio 1.09
Voluntary Benefits Portfolio 1.09dbroitman
 
Gambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visitGambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visitStephen Haggard
 
From Ground Zero to Zero Fear
From Ground Zero to Zero FearFrom Ground Zero to Zero Fear
From Ground Zero to Zero Feardanahee
 

En vedette (20)

Alam Mistik
Alam MistikAlam Mistik
Alam Mistik
 
OEM International Årstämma 2010
OEM International Årstämma 2010OEM International Årstämma 2010
OEM International Årstämma 2010
 
Applying social media strategy for clinicians and researchers
Applying social media strategy for clinicians and researchersApplying social media strategy for clinicians and researchers
Applying social media strategy for clinicians and researchers
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
 
Presentation1
Presentation1Presentation1
Presentation1
 
Dibujos de movil
Dibujos de movilDibujos de movil
Dibujos de movil
 
Week 6 - Trigonometry
Week 6 - TrigonometryWeek 6 - Trigonometry
Week 6 - Trigonometry
 
Challenges of AJAX Development for Smartphone Platforms
Challenges of AJAX Development for Smartphone PlatformsChallenges of AJAX Development for Smartphone Platforms
Challenges of AJAX Development for Smartphone Platforms
 
Horizon News Print and Digital Overview
Horizon News Print and Digital Overview Horizon News Print and Digital Overview
Horizon News Print and Digital Overview
 
Paisajes
PaisajesPaisajes
Paisajes
 
Digital Design _ a1
Digital Design _ a1Digital Design _ a1
Digital Design _ a1
 
U R A Brand! 3
U R A Brand! 3U R A Brand! 3
U R A Brand! 3
 
23205052
2320505223205052
23205052
 
BCC 2005 - NSTC
BCC 2005 - NSTC BCC 2005 - NSTC
BCC 2005 - NSTC
 
חדש 2010 משפט ציבורי מצגת 06.12
חדש 2010 משפט ציבורי מצגת 06.12חדש 2010 משפט ציבורי מצגת 06.12
חדש 2010 משפט ציבורי מצגת 06.12
 
Voluntary Benefits Portfolio 1.09
Voluntary Benefits Portfolio 1.09Voluntary Benefits Portfolio 1.09
Voluntary Benefits Portfolio 1.09
 
Ss14 caywood chandler
Ss14 caywood chandlerSs14 caywood chandler
Ss14 caywood chandler
 
Gambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visitGambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visit
 
Jugar al Dominó
Jugar al DominóJugar al Dominó
Jugar al Dominó
 
From Ground Zero to Zero Fear
From Ground Zero to Zero FearFrom Ground Zero to Zero Fear
From Ground Zero to Zero Fear
 

Similaire à 1.2 security 1

computer security and its relationship to computer forensic
 computer security and its relationship to computer forensic computer security and its relationship to computer forensic
computer security and its relationship to computer forensicShabnamkhan113
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITYKak Yong
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Computer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptxComputer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptxSriArun9
 

Similaire à 1.2 security 1 (20)

computer security and its relationship to computer forensic
 computer security and its relationship to computer forensic computer security and its relationship to computer forensic
computer security and its relationship to computer forensic
 
Computer security
Computer securityComputer security
Computer security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
 
Network Security
Network Security Network Security
Network Security
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Computer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptxComputer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptx
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 

Plus de stjulians school

Diagnostic and therapeutic tools
Diagnostic and therapeutic toolsDiagnostic and therapeutic tools
Diagnostic and therapeutic toolsstjulians school
 
Data collection and logging
Data collection and loggingData collection and logging
Data collection and loggingstjulians school
 
Medical information, administration, marketing and sales
Medical information, administration, marketing and salesMedical information, administration, marketing and sales
Medical information, administration, marketing and salesstjulians school
 
Health - Diagnostic and therapeutic tools
Health - Diagnostic and therapeutic toolsHealth - Diagnostic and therapeutic tools
Health - Diagnostic and therapeutic toolsstjulians school
 
IB Computer Science Section 6.3 Loaders, linkers and library managers
IB Computer Science Section 6.3 Loaders, linkers and library managersIB Computer Science Section 6.3 Loaders, linkers and library managers
IB Computer Science Section 6.3 Loaders, linkers and library managersstjulians school
 
IB Computer Science Section 6.3 Operating Systems
IB Computer Science Section 6.3 Operating SystemsIB Computer Science Section 6.3 Operating Systems
IB Computer Science Section 6.3 Operating Systemsstjulians school
 

Plus de stjulians school (13)

Diagnostic and therapeutic tools
Diagnostic and therapeutic toolsDiagnostic and therapeutic tools
Diagnostic and therapeutic tools
 
Modelling and simulation
Modelling and simulationModelling and simulation
Modelling and simulation
 
Data collection and logging
Data collection and loggingData collection and logging
Data collection and logging
 
Business booklet
Business bookletBusiness booklet
Business booklet
 
Military
MilitaryMilitary
Military
 
Political processes
Political processesPolitical processes
Political processes
 
Da police
Da policeDa police
Da police
 
Medical information, administration, marketing and sales
Medical information, administration, marketing and salesMedical information, administration, marketing and sales
Medical information, administration, marketing and sales
 
Electronic Health Records
Electronic Health RecordsElectronic Health Records
Electronic Health Records
 
Health - Telemedicine
Health - TelemedicineHealth - Telemedicine
Health - Telemedicine
 
Health - Diagnostic and therapeutic tools
Health - Diagnostic and therapeutic toolsHealth - Diagnostic and therapeutic tools
Health - Diagnostic and therapeutic tools
 
IB Computer Science Section 6.3 Loaders, linkers and library managers
IB Computer Science Section 6.3 Loaders, linkers and library managersIB Computer Science Section 6.3 Loaders, linkers and library managers
IB Computer Science Section 6.3 Loaders, linkers and library managers
 
IB Computer Science Section 6.3 Operating Systems
IB Computer Science Section 6.3 Operating SystemsIB Computer Science Section 6.3 Operating Systems
IB Computer Science Section 6.3 Operating Systems
 

1.2 security 1