Professional Documents
Culture Documents
SECURITY
COMPUTER SYSTEM
• Combination of various components.
Speed,
Automation,
Accuracy,
Permanent Storage,
Versatility
Computer Security
The protection of Computer Systems and information from harm, theft, and
unauthorized use.
Computer security has become increasingly important since the late 1960.
***Modem Implementation***
Design system in a way as, when “something bad” will happen , the
negative consequence are limited in scope.
Includes - - -
*** Antivirus,
*** Backup Disk,
*** Repair,
*** File Management &
*** Networking programs.
20/09= 2D
Hacking
Hacking is the process of illegally breaking into someone’s websites/ server &
It is a HTTP status code that means , the page you were trying to reach on a
website couldn't be found on their server.
Here, “Hacking digital India part 1 chase” the cyber crime and cyber attacks
hack the information of users like bank details and personal information.
Attacker or Hacker creates an attractive video so that victim gets attracted and
Error 404 Hacking digital India part 1 chase
cont.…
When , a video has played then during buffering , hacker can know the current
location and GPS history and got complete access to our private data.
The protection of Computer Systems and information from harm, theft, and
unauthorized use.
Computer security has become increasingly important since the late
“1960.”
MODEM Implementation
A Modem (modulator-demodulator) is a device that modulates an analog
signal to digital information.
Problem --- Enabled Hackers to illegally access major computer systems from the privacy
of their homes.
Attack
Scan of QR code!!!
QR - Quick Response
Active Attack
Types:
DoS
Masquerade
Modification of message
Replay
Passive Attack
Types:
DoS
Masquerade
Modification of message
Replay
Passive Attack
Minor version of hacking, as the data within the servers are still intact and
not compromised.
The attacker uses a program that appears to be the server to the client
and appears to be the client to the server.
Hijacking Attacks
Hijacking is a type of network security attack .
Control Hijacking
It prevents Hijacking Attacks.
Hijacking is a type of network security attack in which the attacker takes control
of a communication .
The C standard defines this situation as undefined behavior .It can cause
the value to wrap and become negative.
The System may have the issue of range and requires more
space , then Compiler may –
?
Heap spraying, &