You are on page 1of 10

(Agenda)

introducing

Computer Network
Security





: 02-3545678 5006
E-MAIL: NOC@UNI.NET.TH

security security

Security Hacker

Information Security

Hacking




security security
Vulnerability
Cracker hacking

Ethical hacker security
hacking
Threat



security
Attack








5

1) ,, , 2
2) , Spyway 1. () ,
3) JavaScript,JavaApplet 2. ,
Browser

4) , Spam

5)

(Computer Security) (Computer Viruses)


Computer Viruses
Virus Detection and Removal
Unauthorized Access and Use
Hardware Theft
Software Theft
Information Theft
System Failure
Backup Procedures Worm

15 16
(Computer Viruses) (Computer Viruses)






17 18

(Boot Sector Virus)


1. (Boot Sector Virus)
2. (File Virus)
3. (Trojan Horse Virus) .. Stoned, Angelina, Beijing
4. (Macro Virus)
5. (Email Virus)

19 20
(File Virus) (Trojan Horse Virus)


.exe, .dll, .com

Jerusalem, Die Hard II

21 22

(Macro Virus) (Email Virus)



,


Concept, Bandung
Server
Love Bug, Anna Kunicova

23 24
(Activate Virus)
1. (Access or run an
Virus Detection and Removal
infected files) 1. Hardware
2. (Logic bomb) Save Antivirus
card 1000
3. (Time Bomb) 2. Software
Michelangelo 6
Mcafee, Norton, TrendMicro

25 26

Unauthorized Access and Use

Cracker Hacker


27
1. (UserName and Password)
(Access Control)
2
Access Control


5 6
1. (UserName and Password)
,,
2. (Possessed Object)
3. Biometric
4.
5.

2. (Possessed Object) 3. Biometric


ATM , Keycard
, ,
4. 5.


Login -

Hardware Theft Software Theft


(Software
License)
1.
2. 1
3.
4. Server

35 36

Question?
? & Answer

You might also like