You are on page 1of 14

Chapter Five

Computer security

Compiled by Elias Mohammed


12/23/2021 1
Introduction to Computer security
What is Computer Security?
Computer Security is the protection of computing systems and the
data that they store or access.

➢Security is one that we have to understand as any other topic in


computing and is so encompassing or protecting, (the condition of
not being threatened)

➢security can be physical security, network security, data security,


computer security, and so on.

12/23/2021 Compiled by Elias Mohammed 2


Data Security Methods
Encryption

❖Encryption: The process that lets you secure files against anyone else’s
being able to view them, by encoding the files with a key that only you
have access to. This can be useful if you’re worried about extremely
sensitive information.

❖If a user forgets their password or is unable to access the network to


authenticate their account, they will not be able to open encrypted files.
By default, if the user’s account is lost or deleted, the only other user
who can decrypt the file is the Administrator account.

Compiled by Elias Mohammed


12/23/2021 3
Back up
❖Backup is to copy files or data to a second source or media so as to
safeguard it. Sooner or later, you can count on running into a situation
where a hard drive fails or data becomes corrupted. You also shouldn’t
relay on the Recycle Bin. Although it is a good utility to restore an
occasional file or directory that a user has accidentally deleted, it will
not help you if your drives and the data on them become unusable.

12/23/2021 Compiled by Elias Mohammed 4


➢To protect computer and data from loss, damage and
misuse users take crucial measures. for example – a given
business must ensure that information such as credit, records,
employee and customer profile data and purchase
information is secured. In addition, Home users must secure
credit card number when they use it for on line purchase.

➢Protecting your system from known vulnerability and


common hacker attacks is The basic information security.

Compiled by Elias Mohammed


12/23/2021 5
Computer Crime
Any illegal act involving computer generally referred to as computer
crime

➢Hacking is the process of modifying hard ware &soft ware with out
permission or it is un authorized use of computer and net work
resource.

➢Currently , web based systems are the major gate ways for hackers.

➢Hacker is some one who maliciously breaks in to system for personal


gain, fame & even revenge. They modify, delete & steal critical
information
12/23/2021 Compiled by Elias Mohammed 6
Cracking
❖Is the act of breaking in to computer system.
❖Cracking is a cover name for basically guessing password.
People crack things for email account, my space etc…
❖Gaining un authorized access to computer system to commit
crime such as digging in to the code.
❖ Cracker is some one who access to computer or net work
illegally, but has the intent of destroying data, stealing
information and other malicious action.

12/23/2021 Compiled by Elias Mohammed 7


Hackers and Crackers
➢both have advanced computer and network skill

➢Some hackers are unrepeatable agents to block security holes


of a given system.

➢Many malicious hackers don’t cause damage instead are


selflessly helping others. many of them are electronic
thieves.

➢Hackers hack these information for political, competitive,


financial purpose etc.

12/23/2021 Compiled by Elias Mohammed 8


Computer Viruses
❖A computer virus is a malicious program that is designed to corrupt or delete
the information stored in the computer or it refers to a program which damages
computer systems and/or destroys or erases data files

❖A virus is a piece of software designed to infect a computer system. The virus may
do nothing more than reside on the computer.

❖A virus may also damage the data on your hard disk, destroy your operating system,
and possibly spread to other systems. Viruses get into your computer by a
contaminated floppy, DVD, memory card, or CD-ROM, through e-mail, or as part of
another program.

Compiled by Elias Mohammed


12/23/2021 9
Types of Computer Virus
❖Multi-Partite -A virus which able to infect both files and boot sectors is
said to be multi-partite. Such viruses are highly infectious.

❖ Boot sector or MBR virus-A virus which infects the boot sector of a
fixed or floppy disk. Any formatted disk (even one that is blank, or only
contains text data, for example) may contain a boot sector virus. An
attempt to boot from a diskette infected with a boot sector virus will
cause the virus to become active in memory. This type of virus will place
a copy of itself on the Master Boot Record(MBR) or the boot sector of
the hard drive.

12/23/2021 Compiled by Elias Mohammed 10


❖Circular infection -A type of infection that occurs when 2 viruses
infect the boot sector of a disk, rendering the disk unbootable.
Removing one virus will generally causes a re-infection with the
other virus.

❖Companion Virus - A virus which infects executable files by


creating a ‘companion’ file with the same name but a .COM
extension. Since DOS executes .COM files, followed by .EXE files,
and finally .BAT files, the virus loads before the executable file.

❖Cross-Linked Files - is a common phenomenon rarely associated


with viruses. It occurs when two files appear to share the same
clusters on the disk.

12/23/2021 Compiled by Elias Mohammed 11


❖ worm is also a destructive program that fills a
computer system with self-replicating information,
clogging the system so that its operations are slowed
down or stopped

❖Trojan Horse is a destructive program. It usually


pretends as computer games or application software. If
executed, computer system will be damaged

12/23/2021 Compiled by Elias Mohammed 12


Signs (Symptoms) Infected Computer
➢ Functions slower than normal

➢ Responds slowly and freezes often

➢ Restarts itself often

➢ See uncommon error messages, distorted menus, and dialog boxes

➢ Notice applications fail to work correctly

➢ Fail to print correctly


➢ The disk keeps running out of free space.
➢ Render the disk and programs unusable.

➢ The drive light keeps flashing when you are doing anything

12/23/2021 Compiled by Elias Mohammed 13


Prevention Mechanisms
➢Upload and use antivirus software

➢Be aware of the e-mails and attachments you open

➢Check for updates on antivirus software regularly

➢Make sure antivirus software is installed correctly

➢ Don't share Drive C: without a password and without


read-only restrictions.

12/23/2021 Compiled by Elias Mohammed 14

You might also like