Computer Security

Prepared By : Binay Tiwari

Outline
‡ ‡ ‡ ‡ ‡ IS Vulnerability Types of Computer Crime Computer Security Computer Security Requirements Computer Crime by UnAuthorized Users. ‡ Potentially Malicious computer Programs.

IS Vulnerability
‡ ‡ ‡ ‡ ‡ ‡ ‡ Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK

Types of Computer Crimes
‡ ‡ ‡ ‡ ‡ Hacking Phishing Computer Viruses Cyber stalking Identity Theft

Computer Security
‡ Computer security is a branch of technology known as information security as applied to computers and networks. ‡ . The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users

Computer Security Requirements
‡ ‡ ‡ ‡ ‡ ‡ Secrecy Integrity Availability Authenticity Non-repudiation Access control

Potentially Malicious computer Programs
‡ ‡ ‡ ‡ Malicious Software-malware Viruses Worms Trojans

Computer Crime Through Unauthorized access
‡ Social Engineering ‡ Cracking Passwords

THANK YOU

Sign up to vote on this title
UsefulNot useful