You are on page 1of 10

Computer Security

Prepared By : Binay Tiwari


Outline
• IS Vulnerability
• Types of Computer Crime
• Computer Security
• Computer Security Requirements
• Computer Crime by UnAuthorized
Users.
• Potentially Malicious computer Programs.
IS Vulnerability
• Financial institutions and banks
• Internet service providers
• Pharmaceutical companies
• Government and defense agencies
• Contractors to various government agencies
• Multinational corporations
• ANYONE ON THE NETWORK
Types of Computer Crimes
• Hacking
• Phishing
• Computer Viruses
• Cyber stalking
• Identity Theft
Computer Security
• Computer security is a branch of technology
known as information security as applied to
computers and networks.
• . The objective of computer security includes
protection of information and property from
theft, corruption, or natural disaster, while
allowing the information and property to remain
accessible and productive to its intended users
Computer Security Requirements
• Secrecy
• Integrity
• Availability
• Authenticity
• Non-repudiation
• Access control
Potentially Malicious computer
Programs
Malicious Software-malware
Viruses
Worms
Trojans
Computer Crime Through
Unauthorized access
• Social Engineering
• Cracking Passwords
THANK YOU

You might also like