computer-security
computer-security
• Malware
• Web Threats
What is computer
security ?
THE FATHER OF CYBERSECURITY
}
Bob Thomas is a computer
scientist who is widely
considered “The Father of
Cybersecurity”. In 1997,he
created the first computer
virus called “Creeper Virus”.
Unlike modern malicious
viruses, the creeper virus was
not meant to to cause harm,
instead it was designed to
show how vulnerable computer
COMPUTER SECURITY
1.Network Security:
2. Information Security:
3. Endpoint Security:
4. Application Security:
5. Cloud Security:
8. Physical Security:
1. Viruses - It's a
program that infects a
computer, crippling
the device in order to
self-replicate onto the
system.
M O S T C O M M O N T Y P E S O F M A LW A R E
2. Trojan - A Trojan is
a form of malware
that is downloaded
from the internet or
installed by other
malicious programs.
M O S T C O M M O N T Y P E S O F M A LW A R E
4. Rootkits - a kind of
malware created to hide
its presence within a
computer system. It can
be employed to gain
unauthorized access to a
system or network.
M O S T C O M M O N T Y P E S O F M A LW A R E
5. Spyware - a type of
malware that spies on a
user's computer activity.
This type of malware can
monitor keystrokes, capture
screenshots, web browsing
activity, and also record
audio and/or video.
M O S T C O M M O N T Y P E S O F M A LW A R E
6. Adware - a type of
software that displays
unwanted advertisements
on your computer. It can be
distributed through email
attachments, downloads
and infected websites.
M O S T C O M M O N T Y P E S O F M A LW A R E
7. Ransomware - a type of
malware that encrypts a targeted
victim's files and locks access to
their computer system. This type
of malware demands a ransom
payment in order to receive a
decryption key or another access
method to unlock the system to
regain access to it.
COMMON
W E B T H R E AT S
C O M M O N W E B T H R E AT S
c P TE E U I Y
2. Protects computer networks from attacks and
unauthorized access, using measures such as
firewalls, virtual private networks (VPNs), and
intrusion detection systems
E W R K S U T
3. Protects data, applications, and
infrastructure in cloud computing
environments.
CL D C R T
4. Intrudes into the system and is
designed to damage our computers
M L W E
5. A form of malware that is
downloaded from the internet or
installed by other malicious programs.
R J N
6. A kind of malware created to hide its
presence within a computer system. It
can be employed to gain unauthorized
access to a system or network.
R O K S
7. It's a program that infects a
computer, crippling the device in order
to self-replicate onto the system.
V R S S
8. A category of cybersecurity risks that
may cause an undesirable event or
action via the internet.
W T H E T
9. A form of web security issue that
enables attackers to execute malicious
scripts on trusted websites
C O S - TE C I P G
10. Attacks involve attackers targeting
users through email, text messages, or
social media messaging sites.
P I H N
THE END
GROUP 5