尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Security problems
By: Asst. Lec. Afrah Salman Dawood
Outline
• Internet based fraud
• Password hacking
• Viruses
• Encryption and decryption keys
• Firewalls
• Anti-virus software
• Digital Signatures and certificates
• Computer-related crime.
Internet Fraud
• It is a type of fraud or deception which makes use of
the internet and could involve hiding of information or
providing incorrect information for the purpose of tricking
victims out of money, property, and inheritance.
Types of Internet Fraud
Credit/ Debit Card Fraud
Business Deceit
Recruitment Cheque Scam
Advance Fee Fraud
Non-Delivery of Goods/ Service Fraud
Password Hacking
• Password cracking is the process of recovering secret
passwords from data that has been stored in or transmitted by
computer system.
Types of Password Hacking
Website Hacking
Network Hacking
Ethical Hacking
Email Hacking
Password Hacking
Online Banking Hacking
Computer Hacking
Viruses
• A virus is a small piece of software that piggybacks on real
programs in order to get executed
• Once it’s running, it spreads by inserting copies of itself into
other executable code or documents .
• Typical things that can do to PCs’ are:
1. Display a message
2. Erase files
3. Scramble data on a hard disk
4. Cause erratic screen behavior
5. Halt the PC
6. Many viruses do nothing obvious at all except spread!
Types of Viruses
Time Bomb
Logical Bomb
Worm
Boot Sector Virus
Macros Virus
Trojan Horse
Encryption and Decryption
• Encryption is the process of converting plaintext message into a
ciphertext message.
• Decryption is the process of converting ciphertext message into
a plaintext message.
• The same key must be used in both processes.
• The process of encryption and decryption is called cryptography.
Key
Types of Cryptography Keys
• A cryptographic key is a string of data that is used to lock or
unlock cryptographic functions, including authentication,
authorization and encryption.
• It is categorized according to how it will be used and what
properties it has. It might have one of the following
properties: Symmetric or Asymmetric, Public or Private.
algorithms use
separate keys
for encryption
and decryption
algorithms use
separate keys for
encryption and
decryption
algorithms use
separate keys
for encryption
and decryption
algorithms use
separate keys for
encryption and
decryption
Firewalls
• It is a program or hardware device that filters the information
coming through the internet connection into your private
network or computer system.
• An application firewall is a special firewall that is specifically
coded for the type of traffic it is inspecting and the most
widely developed application is web application firewall.
Types of Firewall
Packet filtering firewall
Circuit-level gateway
Stateful inspection firewall
Application-level gateway (aka proxy firewall)
Next-generation firewall (NGFW)
Anti-virus software
• It is a sw used to prevent, detect and remove all sorts of
malware such as computer viruses, hijackers, Trojan horses,
etc.
• Popular types of anti-viruses used today are:
1. Kaspersky Lab
2. McAfee Virus Scan
3. Avira Antivirus Software
4. Avast Antivirus Software
5. AVG Antivirus and Internet Security
6. Norton Antivirus Software
7. Panda Antivirus Software
Digital Signatures and Certificates
• It is a type of asymmetric cryptography used to simulate the
security properties of a signature in digital, rather than
written, form. Digital signature schemes normally give two
algorithms, one for signing which involves the user's secret or
private key, and one for verifying signatures which involves the
user's public key. The output of the signature process is called
the "digital signature“.
• Digital Certificate is a data with digital signature from one
trusted Certification Authority (CA) or trusted third party. This
data contains: Who owns this certificate, Who signed this
certificate, The expired date, User name & address.
Computer-related crime
• Refers to all the activities done with criminal intent in
cyberspace.
• It may be any crime that involves a computer/mobile and a
network. The computer may have been used in the commission
of a crime, or it may be the target.
Classification of Computer Crimes
Fraud and financial crimes.
Cyber terrorism.
Cyber extortion.
Cyber warfare.
Additionally, computer crime can be categorized as:
Individual
Property
Government
Types of Computer Crimes
• Hacking
• Denial of Service (DoS) Attack
• Cyber Stalking
• Identity Theft
• Malicious Software
• Child Soliciting and Abuse
• Computer Vandalism
• Software Piracy
• Virus Dissemination
Questions?

More Related Content

Similar to Security problems.pptx

Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Sachintha Gunasena
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
SumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
SumanPramanik7
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
Sifat Hossain
 
6 security
6 security6 security
6 security
valency paul
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
Anpumathews
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
E secuity
E secuityE secuity
E secuity
arpit sadana
 
Network Security
Network SecurityNetwork Security
Network Security
Manthan Gandhi
 
Cyber Security.pdf
Cyber Security.pdfCyber Security.pdf
Cyber Security.pdf
preethajoseph5
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
Ankur Kumar
 
Security Requirements in eBusiness
Security Requirements in eBusinessSecurity Requirements in eBusiness
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
Brian Pichman
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
Nithilan1
 
Unit 3
Unit 3Unit 3
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Geevarghese Titus
 
CyberSecurityPPT_V3_1.pptx Awerness cyber
CyberSecurityPPT_V3_1.pptx Awerness cyberCyberSecurityPPT_V3_1.pptx Awerness cyber
CyberSecurityPPT_V3_1.pptx Awerness cyber
harshalgkharat
 

Similar to Security problems.pptx (20)

Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
6 security
6 security6 security
6 security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
E secuity
E secuityE secuity
E secuity
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber Security.pdf
Cyber Security.pdfCyber Security.pdf
Cyber Security.pdf
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Security Requirements in eBusiness
Security Requirements in eBusinessSecurity Requirements in eBusiness
Security Requirements in eBusiness
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
Unit 3
Unit 3Unit 3
Unit 3
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
CyberSecurityPPT_V3_1.pptx Awerness cyber
CyberSecurityPPT_V3_1.pptx Awerness cyberCyberSecurityPPT_V3_1.pptx Awerness cyber
CyberSecurityPPT_V3_1.pptx Awerness cyber
 

More from University of Technology - Iraq

www.pptx
www.pptxwww.pptx
Information System (IS) life cycle.pptx
Information System (IS) life cycle.pptxInformation System (IS) life cycle.pptx
Information System (IS) life cycle.pptx
University of Technology - Iraq
 
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
University of Technology - Iraq
 
Ch12 microprocessor interrupts
Ch12 microprocessor interruptsCh12 microprocessor interrupts
Ch12 microprocessor interrupts
University of Technology - Iraq
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
University of Technology - Iraq
 
IP address and Domain name
IP address and Domain nameIP address and Domain name
IP address and Domain name
University of Technology - Iraq
 
Computer science mcq alle books4u
Computer science mcq   alle books4uComputer science mcq   alle books4u
Computer science mcq alle books4u
University of Technology - Iraq
 
Switches and LEDs interface to the 8051 microcontroller
Switches and LEDs interface to the 8051 microcontrollerSwitches and LEDs interface to the 8051 microcontroller
Switches and LEDs interface to the 8051 microcontroller
University of Technology - Iraq
 
VANET
VANETVANET
Parallel Algorithms: Sort & Merge, Image Processing, Fault Tolerance
Parallel Algorithms: Sort & Merge, Image Processing, Fault ToleranceParallel Algorithms: Sort & Merge, Image Processing, Fault Tolerance
Parallel Algorithms: Sort & Merge, Image Processing, Fault Tolerance
University of Technology - Iraq
 
Wavelet Transform and DSP Applications
Wavelet Transform and DSP ApplicationsWavelet Transform and DSP Applications
Wavelet Transform and DSP Applications
University of Technology - Iraq
 
FSK, PSK, QAM
FSK, PSK, QAMFSK, PSK, QAM
SCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATION
SCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATIONSCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATION
SCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATION
University of Technology - Iraq
 
DSB-SC Demodulation using matlab
DSB-SC Demodulation using matlabDSB-SC Demodulation using matlab
DSB-SC Demodulation using matlab
University of Technology - Iraq
 
Main memory-2 (ch8,os)
Main memory-2 (ch8,os)Main memory-2 (ch8,os)
Main memory-2 (ch8,os)
University of Technology - Iraq
 
CMOS
CMOSCMOS
Wap
WapWap
8086 microprocessor lab manual
8086 microprocessor lab manual8086 microprocessor lab manual
8086 microprocessor lab manual
University of Technology - Iraq
 
Cloud computing
Cloud computingCloud computing

More from University of Technology - Iraq (19)

www.pptx
www.pptxwww.pptx
www.pptx
 
Information System (IS) life cycle.pptx
Information System (IS) life cycle.pptxInformation System (IS) life cycle.pptx
Information System (IS) life cycle.pptx
 
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
 
Ch12 microprocessor interrupts
Ch12 microprocessor interruptsCh12 microprocessor interrupts
Ch12 microprocessor interrupts
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
 
IP address and Domain name
IP address and Domain nameIP address and Domain name
IP address and Domain name
 
Computer science mcq alle books4u
Computer science mcq   alle books4uComputer science mcq   alle books4u
Computer science mcq alle books4u
 
Switches and LEDs interface to the 8051 microcontroller
Switches and LEDs interface to the 8051 microcontrollerSwitches and LEDs interface to the 8051 microcontroller
Switches and LEDs interface to the 8051 microcontroller
 
VANET
VANETVANET
VANET
 
Parallel Algorithms: Sort & Merge, Image Processing, Fault Tolerance
Parallel Algorithms: Sort & Merge, Image Processing, Fault ToleranceParallel Algorithms: Sort & Merge, Image Processing, Fault Tolerance
Parallel Algorithms: Sort & Merge, Image Processing, Fault Tolerance
 
Wavelet Transform and DSP Applications
Wavelet Transform and DSP ApplicationsWavelet Transform and DSP Applications
Wavelet Transform and DSP Applications
 
FSK, PSK, QAM
FSK, PSK, QAMFSK, PSK, QAM
FSK, PSK, QAM
 
SCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATION
SCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATIONSCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATION
SCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATION
 
DSB-SC Demodulation using matlab
DSB-SC Demodulation using matlabDSB-SC Demodulation using matlab
DSB-SC Demodulation using matlab
 
Main memory-2 (ch8,os)
Main memory-2 (ch8,os)Main memory-2 (ch8,os)
Main memory-2 (ch8,os)
 
CMOS
CMOSCMOS
CMOS
 
Wap
WapWap
Wap
 
8086 microprocessor lab manual
8086 microprocessor lab manual8086 microprocessor lab manual
8086 microprocessor lab manual
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
ScyllaDB
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
ScyllaDB
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
NTTDATA INTRAMART
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 

Recently uploaded (20)

Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 

Security problems.pptx

  • 1. Security problems By: Asst. Lec. Afrah Salman Dawood
  • 2. Outline • Internet based fraud • Password hacking • Viruses • Encryption and decryption keys • Firewalls • Anti-virus software • Digital Signatures and certificates • Computer-related crime.
  • 3. Internet Fraud • It is a type of fraud or deception which makes use of the internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance.
  • 4. Types of Internet Fraud Credit/ Debit Card Fraud Business Deceit Recruitment Cheque Scam Advance Fee Fraud Non-Delivery of Goods/ Service Fraud
  • 5. Password Hacking • Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by computer system.
  • 6. Types of Password Hacking Website Hacking Network Hacking Ethical Hacking Email Hacking Password Hacking Online Banking Hacking Computer Hacking
  • 7. Viruses • A virus is a small piece of software that piggybacks on real programs in order to get executed • Once it’s running, it spreads by inserting copies of itself into other executable code or documents . • Typical things that can do to PCs’ are: 1. Display a message 2. Erase files 3. Scramble data on a hard disk 4. Cause erratic screen behavior 5. Halt the PC 6. Many viruses do nothing obvious at all except spread!
  • 8. Types of Viruses Time Bomb Logical Bomb Worm Boot Sector Virus Macros Virus Trojan Horse
  • 9. Encryption and Decryption • Encryption is the process of converting plaintext message into a ciphertext message. • Decryption is the process of converting ciphertext message into a plaintext message. • The same key must be used in both processes. • The process of encryption and decryption is called cryptography. Key
  • 10. Types of Cryptography Keys • A cryptographic key is a string of data that is used to lock or unlock cryptographic functions, including authentication, authorization and encryption. • It is categorized according to how it will be used and what properties it has. It might have one of the following properties: Symmetric or Asymmetric, Public or Private. algorithms use separate keys for encryption and decryption algorithms use separate keys for encryption and decryption algorithms use separate keys for encryption and decryption algorithms use separate keys for encryption and decryption
  • 11. Firewalls • It is a program or hardware device that filters the information coming through the internet connection into your private network or computer system. • An application firewall is a special firewall that is specifically coded for the type of traffic it is inspecting and the most widely developed application is web application firewall.
  • 12. Types of Firewall Packet filtering firewall Circuit-level gateway Stateful inspection firewall Application-level gateway (aka proxy firewall) Next-generation firewall (NGFW)
  • 13. Anti-virus software • It is a sw used to prevent, detect and remove all sorts of malware such as computer viruses, hijackers, Trojan horses, etc. • Popular types of anti-viruses used today are: 1. Kaspersky Lab 2. McAfee Virus Scan 3. Avira Antivirus Software 4. Avast Antivirus Software 5. AVG Antivirus and Internet Security 6. Norton Antivirus Software 7. Panda Antivirus Software
  • 14.
  • 15. Digital Signatures and Certificates • It is a type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. Digital signature schemes normally give two algorithms, one for signing which involves the user's secret or private key, and one for verifying signatures which involves the user's public key. The output of the signature process is called the "digital signature“. • Digital Certificate is a data with digital signature from one trusted Certification Authority (CA) or trusted third party. This data contains: Who owns this certificate, Who signed this certificate, The expired date, User name & address.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Computer-related crime • Refers to all the activities done with criminal intent in cyberspace. • It may be any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • 21. Classification of Computer Crimes Fraud and financial crimes. Cyber terrorism. Cyber extortion. Cyber warfare. Additionally, computer crime can be categorized as: Individual Property Government
  • 22. Types of Computer Crimes • Hacking • Denial of Service (DoS) Attack • Cyber Stalking • Identity Theft • Malicious Software • Child Soliciting and Abuse • Computer Vandalism • Software Piracy • Virus Dissemination
  翻译: