You are on page 1of 16

A GRAND WELCOME TO YOU

MY
FRIENDS
PROJECT WORK OF
COMPUTER
BY:
10B students:
- Ajaya Subedi
- Pratik Hadkhale
- Anupam
Bastakoti
- Kapil Subedi
- Ashim Poudel
- Prabin Adhikari
- Sushank Poudel
- Anushandhan
Tripathi

A presentation on:
Software security
By : 10 B Students

Work given by: Mr. Prakash Kshetri

What is computer security?


Computer security
refers to the
technique for
insuring that data
stored in computer
cannot be read or
compromised by any
individual without
authorization.

The purpose of
computer security is
to device ways to
prevent the
weakness from
being exploited.

Most computer
security measures
involve data
encryption and
password.

Computer Security
provides barriers
and other cybertools that protect
files, programs, and
information to flow
from one pc to next.

WHY?
To protect your PC from
hackers, crackers,
exploiters, Script kiddie
etc.
Secure PC from
unauthorized use by
unauthorized person.
Protect ones computer
from virus, Trojan horse,
Worms and rootkits etc.
Protection of hardware
components like power
fluctation, dust, smoke,
fire, overheat, etc.

Work given by: Mr. Prakash Kshetri

Computer security:
As Computer Security is concerned to both hardware and
software , there are two types of security:
1.Hardware Security
2. Software Security

Hardwa
re
Security

Concerned to
hardware
components to
protect computer
physical factors
from being
damaged or
Methods:
destroyed.
-Regular
Mintainance
- Free from dust,
fire.
- Potection from
theft
etc.

Softwar
e
Security

Concerned to
Software
components to
protect and
secure various
data, information,
programs, from
being lost or
Methods:
damaged.
- Password
Protection.
- Backup System
- Defragmentation
etc.
Work given by: Mr. Prakash Kshetri

Software security Risks:


Malicious Softwares(Malwares)
Malicious softwares may be hidden inside another file or
program or run silently in the background. Most malicious
programs are designed to replicate itself or infect other
files in the computer.
But what actually malicious code does to your computer
depends upon what is it and how destructive it is.
Some such malwares are:
1. Virus:
Software or code written with the express intension of
replicating itself. A virus attempts to spread from computer
to computer by attaching itself to another file or program.

2. Worm:
Software that replicates independently by sending itself
to other systems through network connections.
Work given by: Mr. Prakash Kshetri

Software Security Risks:


3. Trojan horse:
Software that appears to be useful or harmless but that
contains hidden code designed to exploit or damage the
system on which it runs.
4. Spyware:
Soft wares that can display advertisements(such as pop-up
ads), collect information about you, or change settings into
computer.
You usually download spyware without knowing it by
visiting untrustworthy websites.
CREATER OF SUCH MALWARES:
Hacker and cracker
Script kiddie
Corporate Spy
Unethical employee
Cyber Extortionist
Work given by: Mr. Prakash Kshetri

Software Security:
The practice of keeping data, programs,information or
software protected from being lost, corrupt, pirated or
damaged by accidental or intentional harm is known as
software security.
Among various software security measures some of the
common software security measures are as follows:
MEASURES
- Password Protection
- Backup System
- Hard lock key
- Disk Defragmentation
- Scan disk
- Anti-Virus
Work given by: Mr. Prakash Kshetri

Software Security:

1. Password Protection
Password Protection is such protection that are easier,
reliable, and popular way of protecting data and
program in the computer system.
One of the most important security measures we use
nowadays.
Password is a set of characters that gives access to a
particular file, folder, program, or computer system.
Passwords are used commonly to gain entry to
networks and into various Internet accounts in order to
authenticate the user accessing the website.
It allows only those with an authorized password to
gain access to certain information and prevent from
being used by any unauthorized persons.
Work given by: Mr. Prakash Kshetri

Software Security:

1. Password Protection
HOW TO MAKE STRONG PASSWORD
As passwords are very important it is necessary to create a
password that cannot be easily guessed, one that cannot
be easily cracked. Password can be made secure by:
1. Avoid using Common Passwords
2. Use Different Passwords Everywhere
3. Change password from time to time
4. Create password by combining uppercase and
lowercase letters and symbols
5. Password should be easy to remember but difficult to
guess

Work given by: Mr. Prakash Kshetri

Software Security:

2. Backup System:
Backup is the activity of copyingfiles ordatabases so
that they will be preserved in case of equipment failure
or other catastrophe.
One of the best method for securing data and program.
Sometimes our data can be erased or corrupt and in that
case backup system helps to retrieve our lost data.
There are mainly two means of backing up data.
1.Local backup

Internal hard drive


External hard drive (desktop or portable)
Optical drives like CDs, DVDs and Blue Ray discs
USB Thumb drives or Flash Drives
Network Attached Storage (NAS)
Backup to a shared folder on another computer over the
network
Work given by: Mr. Prakash Kshetri

Software Security:

2. Backup System:
2.Online Backup(Cloud Backup)
It is a method of offsite data storage in which files,
folders, or the entire contents of a hard drive are
regularly backed up on a remote server or computer with
a network connection.
With a high-speed Internet connection and a Web
browser interface, the remote files and folders appear as
if they are stored on an external local hard drive.
Examples:
Carbonite
Blackbaze
Crash Plan
One drive
Spider Oak
Work given by: Mr. Prakash Kshetri

Software Security:

3. Hard Lock key


Hard lock key
Hard lock is a versatile software and data protection
system.
It offers the advantage of all hardware modules responding
to the same calls.
It reduces the effort required for programmers and
customers a choice of the protection module, without
having to alter your code.

Work given by: Mr. Prakash Kshetri

Software Security:

4. Defragmentation:
Defragmentation
Fragmentation occurs when old files are deleted and new
files are added.
Defragmentation helps to eliminate such fragments and
free up space in hard disk which increase the speed of hard
disk.
Defragmentation must be done time to time once in a
month or so.
Rearrangement of the files on a hard disk for faster data
access is called defragmentation.
One of the utility program.
We can get Scheduled Optimization in the control panel
which will automatically defragment the disk either daily
weekly or monthly.
Work given by: Mr. Prakash Kshetri

Software Security:

6.Virus Scanning:
To protect from various computer malwares that are a lot
harmful to us, virus scanning must be done.
For virus scanning, we must use antivirus because it
safeguards our computer from virus and other malwares.
We should scan our computer regularly by using such
antivirus programs and update them daily because many
malwares are created daily and antivirus detect them.
Popular Antivirus Programs
Kaspersky Antivirus
avast! antivirus
CA antivirus
Norton Antivirus
Mcafee's antivirus
Work given by: Mr. Prakash Kshetri

Software Security:

6. Scan Disk:
Scan Disk
One of the utility Programs available along with most of
the operating system.
It is used to detect and repair errors on hard disks.
Helps to keep our hard disk in good condition.
Detects lost clusters and bad sectors on the disk.
It can also search corrupted files also(Windows 95/98)
It is better to run scan disk regularly.

Work given by: Mr. Prakash Kshetri

THANK YOU
HAVE A SECURED
WORLD

Work given by: Mr. Prakash Kshetri