SlideShare a Scribd company logo
1 of 21
Presented by
SARMAD MAKHDOOM
 Introduction
 Computer System Security
– Internet Security
– Remote Sharing
– Software Installation
 Operating System Security
– Access Control
– Supervision
– Resource Allocation
 World Population roughly 6 billion
 Computers in this world roughly 2.25
billion
 Internet user roughly 2 billion
 Millions of computer are tied together via
communication network (mostly
telephone system)
WORLD INTERNET USAGE AND POPULATION STATISTICS
World Regions
Population
( 2009 Est.)
Internet Users
Dec. 31, 2000
Internet Users
Latest Data
Penetration
(%
Population)
Growth
2000-2009
Users %
of Table
Africa 991,002,342 4,514,400 86,217,900 8.7 % 1,809.8 % 4.8 %
Asia 3,808,070,503 114,304,000 764,435,900 20.1 % 568.8 % 42.4 %
Europe 803,850,858 105,096,093 425,773,571 53.0 % 305.1 % 23.6 %
Middle East 202,687,005 3,284,800 58,309,546 28.8 % 1,675.1 % 3.2 %
North America 340,831,831 108,096,800 259,561,000 76.2 % 140.1 % 14.4 %
Latin
America/Caribbean
586,662,468 18,068,919 186,922,050 31.9 % 934.5 % 10.4 %
Oceania / Australia 34,700,201 7,620,480 21,110,490 60.8 % 177.0 % 1.2 %
WORLD TOTAL 6,767,805,208 360,985,492 1,802,330,457 26.6 % 399.3 % 100.0 %
 External Security (Interface Security)
– Physical Security
– Operational Security
• Classifications
• Division of Responsibilities
 Internal Security
 Surveillance
(mean: close observation, especially of a suspected spy or criminal)
– Authentication
 Threat Monitoring
– No Direct Access
– Surveillance Programs like supervisor
 Amplification
– Example:Taxpayers information
 Password Protection
– Weaknesses
– Solutions
 Auditing
– Audit Occasionally
– Audit Log
 Access Controls
– Access based on Classifications
 Security Kernels
– Beginning rather than retrofitted
 Hardware Security
– Incorporate Operating System Functions
 Fault-Tolerant Systems
– Hardware rather than Software
• Major Portion of Operating System
• Fault Detection
– Multiple I/O subsystems
 What is Cryptography?
 A cryptographic Privacy System
– Sender
– Encryption Unit
– Ciphertext or cryptogram
– Decryption Unit
– Receiver
* Decryption Key
 Cryptanalysis
A process of attempting to regenerate
plaintext from ciphertext but without knowing
the decryption key
 Public Key Systems
– Different Keys
 Digital Signature
 What areViruses?
 How they affect the system?
 What are Antiviruses?
– Detect Infections
– Prevent Infections
– Recover Infections
 Antiviruses are watchdogs
 Sweeper Programs
 ComputerWorms
– Network based objects
– Virus/Worms
 Trojan horse
– Allows a hacker remote access to a target
computer system
 Spyware
– What is spyware?
– What are adware?
– Adwares and Spyware
– Spyware,Viruses andWorms
 CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities.
The package directs traffic to advertisements on Web sites including coolwebsearch.com. It
displays pop-up ads, rewrites search engine results, and alters the infected computer's hosts
file to direct DNS lookups to these sites.
 HuntBar, aka WinTools or Adware.Websearch, was installed by an ActiveX drive-by download
at affiliate Web sites, or by advertisements displayed by other spyware programs—an example
of how spyware can install more spyware. These programs add toolbars to IE, track aggregate
browsing behavior, redirect affiliate references, and display advertisements.
 MyWebSearch (of Fun Web Products) has a plugin that displays a search toolbar near the top of
a browser window, and it spies to report user search-habits. MyWebSearch is notable for
installing over 210 computer settings, such as over 210 MS Windows registry
keys/values.[39][40] Beyond the browser plugin, it has settings to affect Outlook, email, HTML,
XML, etc. Although tools exist to remove MyWebSearch, it can be hand-deleted in 1 hour, by
users familiar with using Regedit to find and delete keys/values (named with "MyWebSearch").
After reboot, the browser returns to the prior display appearance.
 WeatherStudio has a plugin that displays a window-panel near the bottom of a browser
window. The official website notes that it is easy to remove (uninstall) WeatherStudio from a
computer, using its own uninstall-program, such as under C:Program FilesWeatherStudio.
Once WeatherStudio is removed, a browser returns to the prior display appearance, without
the need to modify the browser settings.
 Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to
advertising. When users follow a broken link or enter an erroneous URL, they see a page of
advertisements. However, because password-protected Web sites (HTTP Basic authentication)
use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to
access password-protected sites.
 Zango (formerly 180 Solutions) transmits detailed information to advertisers about the Web
sites which users visit. It also alters HTTP requests for affiliate advertisements linked from a
Web site, so that the advertisements make unearned profit for the 180 Solutions company. It
opens pop-up ads that cover over the Web sites of competing companies (as seen in their
[Zango End User LicenseAgreement]).
 Zlob trojan, or just Zlob, downloads itself to a computer via an ActiveX codec and reports
information back to Control Server[citation needed]. Some information can be the search-
history, the Websites visited, and even keystrokes.[citation needed] More recently, Zlob has
been known to hijack routers set to defaults.
 avast! Internet Security 5.0
– http://www.pcmag.com/article2/0,2817,2358467,00.asp
 AVG Internet Security 9.0
– http://www.pcmag.com/article2/0,2817,2355028,00.asp
 BitDefenderTotal Security 2010
– http://www.pcmag.com/article2/0,2817,2351546,00.asp
 Kaspersky Internet Security 2010
– http://www.pcmag.com/article2/0,2817,2351568,00.asp
 McAfeeTotal Protection 2010
– http://www.pcmag.com/article2/0,2817,2358902,00.asp
 What is Firewall?
 Hardware Firewall
– Broadband Routers
 Software Firewall
– Norton 360
– Norton Internet Security
– ESET Security Smart
– Kaspersky Internet Security
 What is phishing?
 Five steps to avoid phishing
1. SecureWebsites (https)
2. Authenticity of aWebsite (embedded
links)
3. Thoroughly Investigate before submitting
4. Keep track of your online accounts
5. Have proper computer protection
software
 Day by day usage of computer systems
 Hacking risks
 Need of protection software
 And after that, keep you eyes open when
using internet or transmitting something
on the network
 http://howstuffworks.com/
 http://pcmag.com/
 http://net-security.org/
 http://wikipedia.org/
 Operating Systems by HM Deitel
 Operating Systems Concepts by Abraham
Silberschatz, Peter B. Galvin

More Related Content

What's hot

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and IntegrityZaid Shabbir
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 

What's hot (20)

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
system Security
system Security system Security
system Security
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Network security
Network securityNetwork security
Network security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network security
Network securityNetwork security
Network security
 
information security technology
information security technologyinformation security technology
information security technology
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Network security
Network security Network security
Network security
 
Web Security
Web SecurityWeb Security
Web Security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Web Security
Web SecurityWeb Security
Web Security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 

Similar to Computer System Security Presentation

operatingsystemsecurity-130717170639-phpapp01.pptx
operatingsystemsecurity-130717170639-phpapp01.pptxoperatingsystemsecurity-130717170639-phpapp01.pptx
operatingsystemsecurity-130717170639-phpapp01.pptxKaivanParikh
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionWayne Huang
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasAditya K Sood
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTMsharetech
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWKapil Kanugo
 
Fight bad bot on the internet
Fight bad bot on the internetFight bad bot on the internet
Fight bad bot on the internetCloudflare
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008ClubHack
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008ClubHack
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpJoann Davis
 
Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)Wail Hassan
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
Threat Management Gateway 2010 - Forefront Community launch 2010
Threat Management Gateway 2010- Forefront Community launch 2010Threat Management Gateway 2010- Forefront Community launch 2010
Threat Management Gateway 2010 - Forefront Community launch 2010Krzysztof Binkowski
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guidesaurabh_classic
 

Similar to Computer System Security Presentation (20)

operatingsystemsecurity-130717170639-phpapp01.pptx
operatingsystemsecurity-130717170639-phpapp01.pptxoperatingsystemsecurity-130717170639-phpapp01.pptx
operatingsystemsecurity-130717170639-phpapp01.pptx
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
 
Bitrix Software Security
Bitrix Software SecurityBitrix Software Security
Bitrix Software Security
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
Fight bad bot on the internet
Fight bad bot on the internetFight bad bot on the internet
Fight bad bot on the internet
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Threat Management Gateway 2010 - Forefront Community launch 2010
Threat Management Gateway 2010- Forefront Community launch 2010Threat Management Gateway 2010- Forefront Community launch 2010
Threat Management Gateway 2010 - Forefront Community launch 2010
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guide
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Computer System Security Presentation

  • 2.  Introduction  Computer System Security – Internet Security – Remote Sharing – Software Installation  Operating System Security – Access Control – Supervision – Resource Allocation
  • 3.  World Population roughly 6 billion  Computers in this world roughly 2.25 billion  Internet user roughly 2 billion  Millions of computer are tied together via communication network (mostly telephone system)
  • 4. WORLD INTERNET USAGE AND POPULATION STATISTICS World Regions Population ( 2009 Est.) Internet Users Dec. 31, 2000 Internet Users Latest Data Penetration (% Population) Growth 2000-2009 Users % of Table Africa 991,002,342 4,514,400 86,217,900 8.7 % 1,809.8 % 4.8 % Asia 3,808,070,503 114,304,000 764,435,900 20.1 % 568.8 % 42.4 % Europe 803,850,858 105,096,093 425,773,571 53.0 % 305.1 % 23.6 % Middle East 202,687,005 3,284,800 58,309,546 28.8 % 1,675.1 % 3.2 % North America 340,831,831 108,096,800 259,561,000 76.2 % 140.1 % 14.4 % Latin America/Caribbean 586,662,468 18,068,919 186,922,050 31.9 % 934.5 % 10.4 % Oceania / Australia 34,700,201 7,620,480 21,110,490 60.8 % 177.0 % 1.2 % WORLD TOTAL 6,767,805,208 360,985,492 1,802,330,457 26.6 % 399.3 % 100.0 %
  • 5.  External Security (Interface Security) – Physical Security – Operational Security • Classifications • Division of Responsibilities  Internal Security
  • 6.  Surveillance (mean: close observation, especially of a suspected spy or criminal) – Authentication  Threat Monitoring – No Direct Access – Surveillance Programs like supervisor  Amplification – Example:Taxpayers information
  • 7.  Password Protection – Weaknesses – Solutions  Auditing – Audit Occasionally – Audit Log
  • 8.  Access Controls – Access based on Classifications  Security Kernels – Beginning rather than retrofitted  Hardware Security – Incorporate Operating System Functions
  • 9.  Fault-Tolerant Systems – Hardware rather than Software • Major Portion of Operating System • Fault Detection – Multiple I/O subsystems
  • 10.  What is Cryptography?  A cryptographic Privacy System – Sender – Encryption Unit – Ciphertext or cryptogram – Decryption Unit – Receiver * Decryption Key
  • 11.  Cryptanalysis A process of attempting to regenerate plaintext from ciphertext but without knowing the decryption key  Public Key Systems – Different Keys  Digital Signature
  • 12.  What areViruses?  How they affect the system?  What are Antiviruses? – Detect Infections – Prevent Infections – Recover Infections  Antiviruses are watchdogs  Sweeper Programs
  • 13.  ComputerWorms – Network based objects – Virus/Worms  Trojan horse – Allows a hacker remote access to a target computer system
  • 14.  Spyware – What is spyware? – What are adware? – Adwares and Spyware – Spyware,Viruses andWorms
  • 15.  CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities. The package directs traffic to advertisements on Web sites including coolwebsearch.com. It displays pop-up ads, rewrites search engine results, and alters the infected computer's hosts file to direct DNS lookups to these sites.  HuntBar, aka WinTools or Adware.Websearch, was installed by an ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other spyware programs—an example of how spyware can install more spyware. These programs add toolbars to IE, track aggregate browsing behavior, redirect affiliate references, and display advertisements.  MyWebSearch (of Fun Web Products) has a plugin that displays a search toolbar near the top of a browser window, and it spies to report user search-habits. MyWebSearch is notable for installing over 210 computer settings, such as over 210 MS Windows registry keys/values.[39][40] Beyond the browser plugin, it has settings to affect Outlook, email, HTML, XML, etc. Although tools exist to remove MyWebSearch, it can be hand-deleted in 1 hour, by users familiar with using Regedit to find and delete keys/values (named with "MyWebSearch"). After reboot, the browser returns to the prior display appearance.  WeatherStudio has a plugin that displays a window-panel near the bottom of a browser window. The official website notes that it is easy to remove (uninstall) WeatherStudio from a computer, using its own uninstall-program, such as under C:Program FilesWeatherStudio. Once WeatherStudio is removed, a browser returns to the prior display appearance, without the need to modify the browser settings.
  • 16.  Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising. When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites.  Zango (formerly 180 Solutions) transmits detailed information to advertisers about the Web sites which users visit. It also alters HTTP requests for affiliate advertisements linked from a Web site, so that the advertisements make unearned profit for the 180 Solutions company. It opens pop-up ads that cover over the Web sites of competing companies (as seen in their [Zango End User LicenseAgreement]).  Zlob trojan, or just Zlob, downloads itself to a computer via an ActiveX codec and reports information back to Control Server[citation needed]. Some information can be the search- history, the Websites visited, and even keystrokes.[citation needed] More recently, Zlob has been known to hijack routers set to defaults.
  • 17.  avast! Internet Security 5.0 – http://www.pcmag.com/article2/0,2817,2358467,00.asp  AVG Internet Security 9.0 – http://www.pcmag.com/article2/0,2817,2355028,00.asp  BitDefenderTotal Security 2010 – http://www.pcmag.com/article2/0,2817,2351546,00.asp  Kaspersky Internet Security 2010 – http://www.pcmag.com/article2/0,2817,2351568,00.asp  McAfeeTotal Protection 2010 – http://www.pcmag.com/article2/0,2817,2358902,00.asp
  • 18.  What is Firewall?  Hardware Firewall – Broadband Routers  Software Firewall – Norton 360 – Norton Internet Security – ESET Security Smart – Kaspersky Internet Security
  • 19.  What is phishing?  Five steps to avoid phishing 1. SecureWebsites (https) 2. Authenticity of aWebsite (embedded links) 3. Thoroughly Investigate before submitting 4. Keep track of your online accounts 5. Have proper computer protection software
  • 20.  Day by day usage of computer systems  Hacking risks  Need of protection software  And after that, keep you eyes open when using internet or transmitting something on the network
  • 21.  http://howstuffworks.com/  http://pcmag.com/  http://net-security.org/  http://wikipedia.org/  Operating Systems by HM Deitel  Operating Systems Concepts by Abraham Silberschatz, Peter B. Galvin