Escolar Documentos
Profissional Documentos
Cultura Documentos
Computer Security
LEARNING OUTCOMES:
At the end of the session, the students should be
able to:
1. Understand malware and computer security.
2. Learn how to Install different anti-virus software.
3. Implement a simple computer security measures
against malware.
Introduction to
Computer Security
Security Concepts
VULNERABILITY
•Vulnerability is a weakness in the security system.
•Weaknesses can appear in any element of a
computer, both in the hardware, operating system,
and the software.
The types of vulnerabilities we might find as they
apply to the assets of hardware, software, and data.
•These three assets and the connections among
them are all potential security weak points.
HARDWARE VULNERABILITY
•Hardware is more visible than software, largely
because it is composed of physical objects.
•it is rather simple to attack by adding devices,
changing them, removing them, intercepting the
traffic to them, or flooding them with traffic until
they can no longer function.
SOFTWARE VULNERABILITY
• Software can be replaced, changed, or destroyed
maliciously, or it can be modified, deleted, or
misplaced accidentally. Whether intentional or not,
these attacks exploit the software’s vulnerabilities.
SOFTWARE VULNERABILITY
• Sometimes, the attacks are obvious, as when the
software no longer runs. More subtle are attacks in
which the software has been altered but seems to
run normally.
DATA VULNERABILITY
• a data attack is a more widespread and serious
problem than either a hardware or software attack.
• data items have greater public value than hardware
and software because more people know how to
use or interpret data.
Threats to Computer
System
THREATS
• An interception means
that some
unauthorized party has
gained access to an
asset. The outside
party can be a person,
a program, or a
computing system.
THREATS
• In an interruption is an
asset of the system
becomes lost,
unavailable, or
unusable.
THREATS
• If an unauthorized
party not only accesses
but tampers with an
asset, is called as a
modification.
THREATS
• An unauthorized party
might create a
fabrication of counterfeit
objects on a computing
system.
• The intruder may insert
spurious transactions to
a network
communication system
or add records to an
existing database.
CC101 – INTRODUCTION TO COMPUTING
17
LESSON 12-13 MALWARE AND COMPUTER SECURITY
THREATS
What are the major threats to system security?
Here's a list of the top 10 security threats you should be aware of.
Encryption of data
The most popular of the lot, this cyber incident
encompasses all the ransomware out there that infects
your computer, locks your data, and forces you to pay a
price for ignoring the threats in the cyberworld.
It’s affected everyone – from employees at government
organizations to private citizens running small businesses.
• Potential losses:
• Cyber ransom and extortion
• Directors and officers liability
• Potential losses:
• Financial theft and/or fraud
• Directors and officers’ liability
What makes a
system secure?
LABORATORY ACTIVITY
• Each group should have at least one terminal.
• Install latest Anti-virus Software
• Describe the functions of each antivirus software
References
• https://www.pluralsight.com/blog/it-ops/top-10-
security-threats
• https://techwireasia.com/2018/03/mapping-cyber-
incidents-potential-losses/
THANK YOU
HAVE A
SECURED
WORLD
CC101 – INTRODUCTION TO COMPUTING
45
END