0% found this document useful (0 votes)
6 views46 pages

computer-security

The document provides an overview of computer security, highlighting its importance in protecting systems and information from threats like malware and web attacks. It outlines key objectives of cybersecurity, including confidentiality, integrity, and availability, and details various types of cybersecurity measures such as network, information, and endpoint security. Additionally, it discusses common types of malware and web threats, along with steps to ensure safety from these threats.

Uploaded by

mayerscamahalan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views46 pages

computer-security

The document provides an overview of computer security, highlighting its importance in protecting systems and information from threats like malware and web attacks. It outlines key objectives of cybersecurity, including confidentiality, integrity, and availability, and details various types of cybersecurity measures such as network, information, and endpoint security. Additionally, it discusses common types of malware and web threats, along with steps to ensure safety from these threats.

Uploaded by

mayerscamahalan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 46

COMPUTER SECURITY

• Malware
• Web Threats
What is computer
security ?
THE FATHER OF CYBERSECURITY

}
Bob Thomas is a computer
scientist who is widely
considered “The Father of
Cybersecurity”. In 1997,he
created the first computer
virus called “Creeper Virus”.
Unlike modern malicious
viruses, the creeper virus was
not meant to to cause harm,
instead it was designed to
show how vulnerable computer
COMPUTER SECURITY

It is the protection of computer systems and


information from harm, theft, and
unauthorized use.

Computer hardware is typically protected by


the same means used to protect other
valuable or sensitive equipment—namely,
serial numbers, doors and locks, and alarms.
IMPORTANCE OF COMPUTER SECURITY

With the use of this growing technology,


invaders, hackers and thieves are trying to
harm our computer’s security for monetary
gains, recognition purposes, ransom demands,
bullying others, invading other businesses,
organizations, etc. In order to protect our
system from all these risks, computer security
is important.
KEY OBJECTIVES OF CYBER SECURITY

1. Confidentiality: Preserving authorized restrictions on


information access and disclosure, including means for
protecting personal privacy and proprietary information.

a. Data Confidentiality: Assures that private or confidential


information is not made available or disclosed to
unauthorized individuals.

b. Privacy: Assures that individuals control or influence what


information related to them may be collected and stored and
by whom and to whom that information may be disclosed.
KEY OBJECTIVES OF CYBER SECURITY

2. Integrity: guarding against improper information


modification or destruction, including ensuring information
nonrepudiation and authenticity.

a. Data Integrity: Assures that information (both stored and in


transmitted packets) and programs are changed only in a
specified and authorized manner.

b. System Integrity: Assures that a system performs its


intended function in an unimpaired manner, free from
deliberate or inadvertent unauthorized manipulation of the
system.
KEY OBJECTIVES OF CYBER SECURITY

3. Availability: ensuring timely and reliable access


to and use of information. A loss of availability is
the disruption of access to or use of information or
an information system
TYPES OF CYBER
SECURITY
TYPES OF CYBER SECURITY

1.Network Security:

Protects computer networks from attacks


and unauthorized access, using measures
such as firewalls, virtual private networks
(VPNs), and intrusion detection systems.
TYPES OF CYBER SECURITY

2. Information Security:

Safeguards data integrity, confidentiality,


and availability, both during storage and
transmission. Encryption and access
controls are common techniques here.
TYPES OF CYBER SECURITY

3. Endpoint Security:

Focuses on securing individual devices like


computers, tablets, or smartphones.
Antivirus software, anti-malware tools, and
device-specific protections fall under this
type.
TYPES OF CYBER SECURITY

4. Application Security:

Ensures that software applications are free


from vulnerabilities that hackers could
exploit. Secure coding practices and
regular updates are essential.
TYPES OF CYBER SECURITY

5. Cloud Security:

Protects data, applications, and


infrastructure in cloud computing
environments. It includes measures such as
data encryption, identity management, and
security monitoring.
TYPES OF CYBER SECURITY

6. Identity and Access Management (IAM):

Controls and monitors user access to


systems and data, often through multi-
factor authentication (MFA) and role-
based access controls.
TYPES OF CYBER SECURITY

7. Operational Security (OpSec):

Focuses on securing operational processes


and managing risks associated with
handling data, preventing leaks from both
technical systems and human factors.
TYPES OF CYBER SECURITY

8. Physical Security:

Protects the hardware of computer systems


from theft, damage, or unauthorized
physical access through methods like
locked facilities and surveillance systems.
MOST COMMON TYPES
OF
M A LW A R E
M O S T C O M M O N T Y P E S O F M A LW A R E

1. Viruses - It's a
program that infects a
computer, crippling
the device in order to
self-replicate onto the
system.
M O S T C O M M O N T Y P E S O F M A LW A R E

2. Trojan - A Trojan is
a form of malware
that is downloaded
from the internet or
installed by other
malicious programs.
M O S T C O M M O N T Y P E S O F M A LW A R E

3. Botnet - groups of devices


infected with malware to
perform a specific task. These
types of malware bots can be
used for malicious reasons,
including as sending spam
emails, phishing, smishing,
launching DDoS attacks or
distributing malware.
M O S T C O M M O N T Y P E S O F M A LW A R E

4. Rootkits - a kind of
malware created to hide
its presence within a
computer system. It can
be employed to gain
unauthorized access to a
system or network.
M O S T C O M M O N T Y P E S O F M A LW A R E

5. Spyware - a type of
malware that spies on a
user's computer activity.
This type of malware can
monitor keystrokes, capture
screenshots, web browsing
activity, and also record
audio and/or video.
M O S T C O M M O N T Y P E S O F M A LW A R E

6. Adware - a type of
software that displays
unwanted advertisements
on your computer. It can be
distributed through email
attachments, downloads
and infected websites.
M O S T C O M M O N T Y P E S O F M A LW A R E

7. Ransomware - a type of
malware that encrypts a targeted
victim's files and locks access to
their computer system. This type
of malware demands a ransom
payment in order to receive a
decryption key or another access
method to unlock the system to
regain access to it.
COMMON
W E B T H R E AT S
C O M M O N W E B T H R E AT S

·Phishing - attacks involve attackers


targeting users through email, text
messages, or social media messaging
sites.
C O M M O N W E B T H R E AT S

·Structured Query Language (SQL) - is a computing


language used to search and query databases. SQL
injection is a web security threat in which attackers
exploit vulnerabilities in the application code.
C O M M O N W E B T H R E AT S

·Cross-site scripting (XSS) is a form of web security


issue that enables attackers to execute malicious
scripts on trusted websites
C O M M O N W E B T H R E AT S

• Distributed denial-of-service (DDoS) attack is a web


security threat that involves attackers flooding servers
with large volumes of internet traffic to disrupt service
and take websites offline.
C O M M O N W E B T H R E AT S

• Viruses and worms are malicious programs that spread


through computers and networks. Both exploit software
vulnerabilities that allow an attacker to steal data from
systems.
S T E P S T O E N S U R E T H AT Y O U A R E S A F E F R O M
T H E S E C O M P U T E R T H R E AT S

·Always keep your Operating System up to date.


·Always use a secure network connection.
·Always install an Antivirus and keep it up to date.
·Enable firewall.
S T E P S T O E N S U R E T H AT Y O U A R E S A F E F R O M
T H E S E C O M P U T E R T H R E AT S

• Be mindful of software and app downloads.


• Use strong and unique passwords.
• Be cautious with emails attachments and
links.
QUIZ!!!
1. It is the protection of computer systems and
information from harm, theft, and unauthorized
use.

c P TE E U I Y
2. Protects computer networks from attacks and
unauthorized access, using measures such as
firewalls, virtual private networks (VPNs), and
intrusion detection systems

E W R K S U T
3. Protects data, applications, and
infrastructure in cloud computing
environments.

CL D C R T
4. Intrudes into the system and is
designed to damage our computers

M L W E
5. A form of malware that is
downloaded from the internet or
installed by other malicious programs.

R J N
6. A kind of malware created to hide its
presence within a computer system. It
can be employed to gain unauthorized
access to a system or network.

R O K S
7. It's a program that infects a
computer, crippling the device in order
to self-replicate onto the system.

V R S S
8. A category of cybersecurity risks that
may cause an undesirable event or
action via the internet.

W T H E T
9. A form of web security issue that
enables attackers to execute malicious
scripts on trusted websites

C O S - TE C I P G
10. Attacks involve attackers targeting
users through email, text messages, or
social media messaging sites.

P I H N
THE END
GROUP 5

John Chloe Sombilon


Vienna Bianca Limosnero
Dheian Alexa Valencia
Janinne S. Rana
Jeraldane Bolor
Nica Pearl Mamolo
Freah Jean Masulong

You might also like