You are on page 1of 60

‫السالم عليكم‬

PRESENTATION
SKILLS DEVELOPMENT
PRESENTED BY:
M MADNI
NAUMAN KHUSHI MUHAMMAD
ALI AHMED AWAN
BILAL TAHIR
FAIZAN HAIDER
M FURQAN NAEEM
M DANISH

TO :
MA’AM AYESHA ALI
SLIDE 1:
Title:
"Introduction to
Computer Graphics"
Subtitle:
"Exploring the World of
Digital Visuals"

. .
Definition:
"Computer graphics
involves the creation,
manipulation, and
representation of visual
images and animations
using computers."

Importance:
"Essentials in various
fields such as design,
entertainment ,education,
and simulations."
SLIDE 2: DEFINITION AND IMPORTANCE Simple Graphics
Icon/Representation
. . .
SLIDE 3:
BASIC ELEMENTS OF
COMPUTER GRAPHICS

1 2 3
"Pixels: The smallest "Resolution: The "Color Depth: The
unit of a digital number of pixels in number of colors that
image." an image, affecting its can be represented in
clarity." an image."

. . .
SLIDE 4:
TYPES OF
COMPUTER
GRAPHICS
Categories
"2D Graphics: Flat images on
a plane, like drawings or text."
"3D Graphics: Creating three-
dimensional objects for a
more realistic experience."
"Vector Graphics: Uses
mathematical equations to
represent images, allowing
scalability without loss of
quality."
. . .
SLIDE 5:
APPLICATIONS OF
COMPUTER
GRAPHICS
"Entertainment: Video games, movies,
and virtual reality."
"Design: Graphic design, product
modeling, and architectural
visualization."
"Education: Interactive learning
materials and simulations."
Visuals: Icons representing each
application area
. .
SLIDE 6:
TOOLS AND
SOFTWARE
Some popular software:
"Adobe Photoshop and
Illustrator for 2D graphics."
"Blender and Autodesk
Maya for 3D modeling and
animation."
"CorelDRAW for vector
graphics."

. . .
"Augmented Reality and
Virtual Reality integration."
"Real-time rendering
SLIDE 7: advancements."
FUTURE TRENDS IN "Artificial Intelligence in
COMPUTER GRAPHICS graphics creation."
Closing statement:
"Exciting possibilities lie
ahead as technology
continues to push the
boundaries of computer
graphics."

. .
COMPUTER

SECURITY

Presentation By:

Bilal Ashraf
Tahir
INTRODUCTION TO
COMPUTER
SECURITY
• Computer security basically is the
protection of computer systems and
information from harm, theft, and
unauthorized use.

• It is the process of preventing and


detecting unauthorized use of your
computer system.

• Computer Security mainly focuses on


three factors:
I. Security Attacks
II. Security Services
III. Security Mechanisms
COMPUTER
SECURITY

IMPORTANT
Cyber Crime is on the
rise
?
• Damage is Significant

• Cyber Security builds


trust

• Our identities protect


our data
MALICIOUS
SOFTWARE
Malware is any software intentionally
designed to
cause damage to a computer,
server, client, or
computer network.
Malware is typically delivered in the
form of a link or
file over email and requires the user
to click on the link or open the file to
execute the malware.
Malware has actually been a threat to
individuals and
organizations since the early
1970s when the
Creeper virus first appeared
A wide variety of malware types exist:-
1. Computer Viruses
2. Worms
3. Trojan Horses
SECURITY SERVICES

• The security services


Confide provide specific kind of
nti resourc
protection to system
ality es.
Availabil Integri
• Security services
ity ty
ensure Confidentiality,
Secur Integrity,
Authentication, and
ity Non- Repudiation of
Acce Servic Authen data or message stored
ss es tic on the computer, or
Contr atio when transmitted over
ol n
Non-
Repudiat
the network.
ion
• Additionally, it provides
assurance for access
control and availability of
THE CIA
TRIAD
COMPUTER SECURITY IS MAINLY
CONCERNED WITH THESE THREE MAIN
1.Confidentiality isAREAS:
ensuring that
information is available only to the
intended audience

2.Integrity is protecting information from


being modified
by unauthorized parties

3.Availability is making data and


resources requested by authorized users
available to them when requested.
0
CONFIDENTI
1 ALITY
Typically, this involves ensuring that only
those who are authorized have access to
specific assets and that those who are
unauthorized are actively prevented from
obtaining access.
Confidentiality can be violated in
many ways, for example, through
direct attacks designed to gain
unauthorized access to systems, Some information security
applications, and databases in order basics to keep your data
confidential are:
A
tofailure
steal ortotamper
maintain confidentiality
with data. means
that someone who shouldn’t have access Encryption
has managed to get access to private Passw
information. ord
Two-factor
authentication

Biometric
0
INTEGR
2 ITY
Integrity is about ensuring that data has not
been tampered with and, therefore, can be
trusted. It is correct, authentic, and reliable.

Ecommerce customers, for example, expect


product and pricing information to be
accurate, and that quantity, pricing, availability,
and other information will not be altered after
they place an order. Some security controls designed to
information
maintain the
Ensuring integrity involves protecting data in include:
use, in transit (such as when sending an email Encrypti
or uploading or downloading a file), and when on
User access
it is stored, whether on a laptop, a portable
controls
storage device, in the data center, or in the Version
Integrity goes hand in hand with the concept
cloud. control
of non- repudiation: the inability to deny
Backup and
something. Non-repudiation assists in
ensuring integrity. recovery
procedures
0
AVAILABIL
3 ITY
Simply, availability means that networks,
systems, and applications are up and
running. It ensures that authorized users
have timely, reliable access to resources
when they are needed.

Many things can jeopardize availability,


including hardware or software failure, power
failure, natural disasters, and human error.
Perhaps the most well-known attack that
threatens
In Denial ofavailability is thethe
service attack Denial of serviceof a
performance Encrypti
attack website, web-based application, or
system, on
Passw
web-based service is intentionally and
ord
maliciously degraded, or the system becomes Two-factor
completely unreachable. authentication
To prevent data loss from such occurrences, Biometric
a backup copy may be stored in a verification
geographically isolated location, perhaps
INTRODUCTION
SPAM
DEFINITION
TYPES
SOLUTIONS
WHAT IS COMPUTER VIRUS?
A computer virus is a type of malicious software that spreads between
computers and causes damage to data and software

First virus Creeper program was discover by Bob Thomas in 1971


First virus BRAIN was develop by two Pakistani brothers Basit and
Amjad Farooq Alvi in 1986
COMMON SIGNS OF COMPUTER
VIRUSES

Mass
Accounts Emails
Speed of Pop-up Being Being Sent
System Windows Logged from Your
Out Email
Account
TYPES
TYPES
MACRO VIRUS

You might also like