Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
59 views12 pages

I Am Sharing Document With You

Computer security, also known as cybersecurity, involves protecting computers and networks from damage, unauthorized access or theft. The document discusses different elements of computer security like confidentiality, integrity and availability. It also defines common cybersecurity terms like hacking, viruses, spyware, firewalls and provides tips to improve security like updating software, protecting personal information, and backing up files. Computer security is important to protect systems and data from various online threats.

Uploaded by

Edmar Barreda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views12 pages

I Am Sharing Document With You

Computer security, also known as cybersecurity, involves protecting computers and networks from damage, unauthorized access or theft. The document discusses different elements of computer security like confidentiality, integrity and availability. It also defines common cybersecurity terms like hacking, viruses, spyware, firewalls and provides tips to improve security like updating software, protecting personal information, and backing up files. Computer security is important to protect systems and data from various online threats.

Uploaded by

Edmar Barreda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Basic Computer Security/ Cyber Security

by

Edmar M.Barreda

Criminology Block-H

Student

A Advanced Research Submitted to

Mrs. Mary Ann Leron Maceda

Instructor
Computer Security

Computer Security is the protection of computing systems and the data that
they store or access. Computer security, also known as cyber security or IT
security, is the protection of computer systems from the theft or damage to
their hardware, software or information.

Different Elements in Computer Security

Confidentiality is the concealment of information or resources. Integrity is


the trustworthiness of data in the systems or resources by the point of view
of preventing unauthorized and improper changes. Availability refers to the
ability to access data of a resource when it is needed, as such the
information has value only if the authorized people can access at right time.

Different terminology used in Computer Security

Unauthorized access - an unauthorized access is when someone gains access


to a server, website, or other sensitive data using someone else's account
details. Hacker - Is a Person who tries and exploits a computer system for a
reason which can be money, a social cause, fun etc. Threat – Is an action or
event that might compromise the security. Vulnerability - It is a weakness, a
design problem or implementation error in a system that can lead to an
unexpected and undesirable event regarding security system. Attack Is an
assault on the system security that is delivered by a person or a machine to
a system. It violates security. Antivirus or Antimalware Is a software that
operates on different OS which is used to prevent from malicious software.
Social Engineering - Is a technique that a hacker uses to steal data from a
person for different purposes by psychological manipulation combined with
social scenes. Virus - It is a malicious software that installs on your
computer without your consent for a bad purpose. Firewall - It is a software
or hardware which is used to filter network traffic based on rules.

Hacking

Hacking means using computers to commit fraudulent acts such as fraud,


privacy invasion, stealing corporate/personal data, etc. A Hacker is a person
who finds and exploits the weakness in computer systems and/or networks
to gain access. Hackers are usually skilled computer programmers with
knowledge of computer security.

Ethical Hacking

Identifying weakness in computer systems and/or computer networks and


coming with countermeasures that protect the weaknesses. Ethical hackers
must abide by the following rules. Get written permission from the owner of
the computer system and/or computer network before hacking. Protect the
privacy of the organization been hacked. Transparently report all the
identified weaknesses in the computer system to the organization. Inform
hardware and software vendors of the identified weaknesses.

Cyber crime

Cyber crime is the use of computers and networks to perform illegal


activities such as spreading computer viruses, online bullying, performing
unauthorized electronic fund transfers, etc. Most cybercrimes are committed
through the internet. Some cybercrimes can also be carried out using Mobile
phones via SMS and online chatting applications.

Types of Cybercrime

Privacy violation: Exposing personal information such as email addresses,


phone number, account details, etc. on social media, websites, etc. Identity
Theft: Stealing personal information from somebody and impersonating that
person. Sharing copyrighted files/information: This involves distributing
copyright protected files such as eBooks and computer programs etc.
Electronic funds transfer: This involves gaining an un-authorized access to
bank computer networks and making illegal fund transfers. ATM Fraud: This
involves intercepting ATM card details such as account number and PIN
numbers. These details are then used to withdraw funds from the
intercepted accounts. Spam. Sending unauthorized emails. These emails
usually contain advertisement.

Virus

A computer virus is a type malware that, when executed, replicates itself by


modifying other computer programs and inserting its own code. A computer
virus is written to alter the way a computer operates and that is designed to
spread from one computer to another. In order for a virus to infect your
computer, you have to run the infected program, which in turn causes the
virus code to be executed.

How do computer viruses spread?

it is spread through or by the following: Email and text message


attachments, Internet file downloads, social media links. Mobile devices and
smart phones can become infected with mobile viruses through shady App
downloads. As attachments of socially shareable content such as funny
images, greeting cards, or audio and video files. Inserting or connecting an
infected disk, disc, or drive, and visiting unknown links
Possible effects of virus attack on a computer are:

Delete data, overwrite information, display messages, Add itself to other


files on the computer, stealing passwords or data, Logging keystrokes,
corrupting files, spamming email contacts and even taking over the
machine.

Anti-virus software is a program or set of programs that are designed to


prevent, search for, detect, and remove software viruses. There are several
different companies that build and offer anti- virus software and what each
offers can vary but all perform some basic functions: Scan specific files or
directories for any malware or known malicious patterns. Allow you to
schedule scans to automatically run for you. Allow you to initiate a scan of a
specific file or of your computer, or of a CD or flash drive at any time.
Remove any malicious code detected -sometimes you will be notified of an
infection and asked if you want to clean the file, other programs will
automatically do this behind the scenes. Show you the health' of your
computer. Always be sure you have the best, up-to-date security software
installed to protect your computers, laptops, tablets and smart phones.

Spyware

Spyware is software that aims to gather information about a person or


organization without their knowledge, that may send such information to
another entity without the consumer's consent. "Spyware" is mostly
classified into four types: adware, system monitors, tracking cookies, and
trojans; Spyware that is installed for innocuous reasons is sometimes
referred to as tracking software.

Spyware can collect almost any type of data, including personal information
like internet surfing habits, user logins, and bank or credit account
information. Spyware can also interfere with a user's control of a computer
by installing additional software or redirecting web browsers. Some spyware
can change computer settings, which can result in slow Internet connection
speeds, un-authorized changes in browser settings, or changes to software
settings. If a smart phone gets infected with mobile spyware that was
sideloaded with a third party app, the phone's camera and microphone can
be used to spy on nearby activity, record phone calls, log browsing activity
and keystrokes, and monitor the phone owner's location.

How to recognize spyware

New and/or unidentifiable icons may appear in the task bar at the bottom of
your screen. Searches may result in you being redirected to a different
search engine. Random error messages appear when you perform
operations that previously worked fine. But the best way to identify if you
have been infected is to use a spyware scanner, which will be included in
any spyware removal software.

Spyware Prevention
Install a security program that lets you know when any program is being
installed, so that you can choose to authorize or stop the installation

Firewall

In computing, a firewall is a network security system that monitors and


controls the incoming and outgoing network traffic based on predetermined
security rules. A firewall acts as a barrier between a trusted network and
non-trusted network. This means that the only traffic allowed onto the
network is defined in the firewall policy; all other traffic is denied.

Measures to keep your system and data safe

Computer Application White listening - The idea is to install just a restricted


number of applications in your computers, which are useful as well as are
genuine. Computer System Restore Solution In case your computer is
hacked and your files are damaged, you should have the possibility to again
have access to your files. An example is Windows System Restore or
Backup. Computer and Network Authentication - The data that is accessed
over the network is best to be provided only to the authorized users. Use
usernames and passwords. Update Your Software. Keep your software -
including your operating system, the web browsers you use to connect to
the Internet, and your apps - up to date to protect against the latest threats.
Outdated software is easier for criminals to break into. If you think you have
a virus or bad software on your computer, check out how to detect and get
rid of malware. Protect Your Personal Information. Don't hand it out to just
anyone. Your Social Security number, credit card numbers, and bank and
utility account numbers can be used to steal your money or open new
accounts in your name. So every time you are asked for your personal
information - whether in a web form, an email, a text, or a phone message
think about why someone needs it and whether you can really trust the
request. Give Personal Information Over Encrypted Websites Only. If you're
shopping or banking online, stick to sites that use encryption to protect your
information as it travels from your computer to their server. To determine if
a website is encrypted, look for https at the beginning of the web address.
That means the site is secure. Back Up Your Files. No system is completely
secure. Copy your files to an external hard drive or cloud storage. If your
computer is attacked by malware, you'll still have access to your files.

What is cybersecurity?

Cybercrime is today's fastest-growing form of criminal activity. The concept


associated with cyber security is that it protects important data and
information from strangers and hackers. Cyber security professionals are
responsible for protecting servers, networks, and computer systems with the
confidentiality of this information in mind, these experts make sure that only
authorized people can access the information

What is information security?

Information security from any unauthorized use, access, alteration or


removal of information based on protection. He specializes in data security.
It helps to protect against data corruption or theft. On the computer all that
is stored is called data, which is converted into information when they are
transferred. Every information is a property. Once the information is
processed, the companies make any mistakes requires information security
to protect against use and tampering.

Cybercrime and Business

Cybercrime is nowadays fastest-growing from of criminal activity. According


to Accenture, the cost of cybercrimes to businesses will reach $5.2 trillion
within the next five years. According to Hiscox, an insurance carrier, the
average cost of cyberattacks to small businesses is $200,000 on average
McAfee, an anti-virus provider, reports that 480 new high-tech threats are
introduced every minute.

Current State of Cybercrime

In 2017, Equifax, one of the largest consumer credit agency, was attacked.
Hackers stole sensitive information of 143 million people. The incident cost
Equifax $600 million. In 2017, Uber reported a data breach including
information of 600,000 drivers and $7 million Uber users worldwide. Uber
paid $148 million in regulatory fines. In 2018, Marriot reported that data of
up to 383 million guests were exposed. Marriot paid $200 million in fines. In
2018, Aadhaar, the world's largest government database was breached and
information about 1 billion people was exposed.

Terminologies in Cybersecurity
Malicious Software: Viruses Worms and Trojan Horses, Denial-of-Service
(DoS) attacks, Ran some ware Attacks: Blocking access until get paid,
Botnets, Spyware, Espionage, Social Engineering, Phishing/Spear Phishing,
Evil Twins: Hack5-Wifi pineapple, Tools in Cybersecurity/Cybercrime

Software: Kali Linux applications, Exploits

There are many platforms to get exploits

Hardware: GPU, Hack5 package, rubber ducky

Good Browsing habits:

Chrome: Incognito mode, Clear DNS Cache: delete all unnecessary Ips,
Cmd/ipconfig / Flushdns, Antivirus, Password manager, Ad blocker, Avoid
danger websites, links files, Use VPN, Check app permissions, In what areas
do you need to study to work in cybersecurity, Information security analyst,
Information security coordinator, Cybersecurity analyst, Information security
manager, Information security officer, Information security engineer,
Cybersecurity security analyst, Software security specialist, Cryptographer,
Forensic specialist, Chief information security officer.
Sources

https://www.slideshare.net/EktaVaswani2/computer-security-126611235

https://www.academia.edu/43434174 Basics_of_cybersecurity

You might also like