You are on page 1of 20

THREATS TO COMPUTER AND USER

INTRODUCTION TO COMPUTER
BY FAJAR PRADIPTA ZN, S.Hum
This Photo by Unknown author is licensed under CC BY-NC.
BASIC Computer Security is the protection of computing
systems and the data they store or access
COMPUTER Why do we need to study computer security, because
SECURITY a computer will not protect itself.

BY FAJAR PRADIPTA ZN, S.Hum


BY FAJAR PRADIPTA ZN, S.Hum

• To prevent theft or damage to


REASONS TO the hardware
SECURE YOUR • To prevent theft or damage to
the information
COMPUTER • To prevent disruption of service
KEY AREAS OF
COMPUTER SECURITY
-CONFIDENTIALITY-
Only authorized users can access the data,
resources, and information
-INTEGRITY-
Only authorized users should be able to
modify the data when needed
-AVAILABILITY-
Data should be available to users when
needed
-AUTHENTICATION-
The computer system should be able to
verivy the identitiy of a user.

BY FAJAR PRADIPTA ZN, S.Hum


TYPES OF COMPUTER
SECURITY THREATS
INTRODUCTION TO COMPUTER
BY FAJAR PRADIPTA ZN, S.Hum
Is the act of breaking the course of
communication, so that the data does
not reach its destination.
For example :
INTERUPTION • Attack on availability
• Destruction of hardware
• Cutting of communication line
• Disabline the file management
system

BY FAJAR PRADIPTA ZN, S.Hum


It is an act of intercepting data that is
in the process of being sent due to
an unauthorized party gaining
access. For Example :
INTERCEPTION • Attack on confidentiality
• Wiretapping to capture data in a
network
• Illicit copying of files or programs

This Photo by Unknown author is licensed under CC BY.


Unauthorized parties not only gain access
rights to the data, but also tamper the
assets contained in the data. For Example :
• Attack on integrity
MODIFICATION • Changing values in a data file
• Tampering a program so it performs
differently
• Modifying the content of messages
Basically, Unauthorized party sends fake data into
the system. For Example :
FABRICATION • Attack on authenticity
• Insertion of spurious messages in a network
• Addition of records to a file
TYPES OF SECURITY ATTACK
INTRODUCTION TO COMPUTER

BY FAJAR PRADIPTA ZN, S.Hum


SOCIAL ENGINEERING

This type of cyber-attack, is the simplest,


because it almost does not require
programming. It can even be done directly
without a computer.
The attacker only needs to convince the
victim to provide the desired information
in order to carry out further attacks.
-Types of Social Engineering-
• Baiting
• Phising
• Pretexing

BY FAJAR PRADIPTA ZN, S.Hum


BY FAJAR PRADIPTA ZN, S.Hum
BY FAJAR PRADIPTA ZN, S.Hum
REVERSE
SOCIAL ENGINEERING

One of the Social Engineering methods,


the attacker convinces that the victim
has a problem and the attacker has
solutions for the problem.
The attacker will start the action by
providing a fake solution & making an
entrance into the victim's computer.

BY FAJAR PRADIPTA ZN, S.Hum


THE VIRUS
One of the classic and most popular
computer threats. Viruses have the ability
to spread themselves by infecting files on
the computer.
Some of the side effects of virus infection
on a computer are:
1. The victim's computer becomes
slow.
2. Change of file extension infected by
virus.
3. Processor workload is always high.
4. Damage to the operating system.

BY FAJAR PRADIPTA ZN, S.Hum


THE WORMS
Worms are stand-alone programs
that do not require user
intervention to propagate. The
worm does not infect files but
replicates itself into the system.
Computers that have been infected
with the Worm, have a high
probability of data leakage.

BY FAJAR PRADIPTA ZN, S.Hum


TROJAN

One type of malware that


resembles a legitimate
program. Although it doesn't
look like a malware program,
it does open a backdoor on
your system.

BY FAJAR PRADIPTA ZN, S.Hum


RANSOMWARE

One type of malware that locks


the user's files, and usually
malware authors will ask for a
ransom to open locked files,
such as money and bit coins.

BY FAJAR PRADIPTA ZN, S.Hum


SPYWARE

A common computer security threat,


spyware is a class of malicious
program that secretly steals your
personal information and sends it to
the advertisers or someone else.

BY FAJAR PRADIPTA ZN, S.Hum


ROGUE
ANTIVIRUS
A rogue antivirus, also known as
scareware, is a fake program that
disguises itself as genuine software,
but performs malicious actrvities in
user`s machine.

BY FAJAR PRADIPTA ZN, S.Hum

You might also like