際際滷

際際滷Share a Scribd company logo
Security problems
By: Asst. Lec. Afrah Salman Dawood
Outline
 Internet based fraud
 Password hacking
 Viruses
 Encryption and decryption keys
 Firewalls
 Anti-virus software
 Digital Signatures and certificates
 Computer-related crime.
Internet Fraud
 It is a type of fraud or deception which makes use of
the internet and could involve hiding of information or
providing incorrect information for the purpose of tricking
victims out of money, property, and inheritance.
Types of Internet Fraud
Credit/ Debit Card Fraud
Business Deceit
Recruitment Cheque Scam
Advance Fee Fraud
Non-Delivery of Goods/ Service Fraud
Password Hacking
 Password cracking is the process of recovering secret
passwords from data that has been stored in or transmitted by
computer system.
Types of Password Hacking
Website Hacking
Network Hacking
Ethical Hacking
Email Hacking
Password Hacking
Online Banking Hacking
Computer Hacking
Viruses
 A virus is a small piece of software that piggybacks on real
programs in order to get executed
 Once its running, it spreads by inserting copies of itself into
other executable code or documents .
 Typical things that can do to PCs are:
1. Display a message
2. Erase files
3. Scramble data on a hard disk
4. Cause erratic screen behavior
5. Halt the PC
6. Many viruses do nothing obvious at all except spread!
Types of Viruses
Time Bomb
Logical Bomb
Worm
Boot Sector Virus
Macros Virus
Trojan Horse
Encryption and Decryption
 Encryption is the process of converting plaintext message into a
ciphertext message.
 Decryption is the process of converting ciphertext message into
a plaintext message.
 The same key must be used in both processes.
 The process of encryption and decryption is called cryptography.
Key
Types of Cryptography Keys
 A cryptographic key is a string of data that is used to lock or
unlock cryptographic functions, including authentication,
authorization and encryption.
 It is categorized according to how it will be used and what
properties it has. It might have one of the following
properties: Symmetric or Asymmetric, Public or Private.
algorithms use
separate keys
for encryption
and decryption
algorithms use
separate keys for
encryption and
decryption
algorithms use
separate keys
for encryption
and decryption
algorithms use
separate keys for
encryption and
decryption
Firewalls
 It is a program or hardware device that filters the information
coming through the internet connection into your private
network or computer system.
 An application firewall is a special firewall that is specifically
coded for the type of traffic it is inspecting and the most
widely developed application is web application firewall.
Types of Firewall
Packet filtering firewall
Circuit-level gateway
Stateful inspection firewall
Application-level gateway (aka proxy firewall)
Next-generation firewall (NGFW)
Anti-virus software
 It is a sw used to prevent, detect and remove all sorts of
malware such as computer viruses, hijackers, Trojan horses,
etc.
 Popular types of anti-viruses used today are:
1. Kaspersky Lab
2. McAfee Virus Scan
3. Avira Antivirus Software
4. Avast Antivirus Software
5. AVG Antivirus and Internet Security
6. Norton Antivirus Software
7. Panda Antivirus Software
Security problems.pptx
Digital Signatures and Certificates
 It is a type of asymmetric cryptography used to simulate the
security properties of a signature in digital, rather than
written, form. Digital signature schemes normally give two
algorithms, one for signing which involves the user's secret or
private key, and one for verifying signatures which involves the
user's public key. The output of the signature process is called
the "digital signature.
 Digital Certificate is a data with digital signature from one
trusted Certification Authority (CA) or trusted third party. This
data contains: Who owns this certificate, Who signed this
certificate, The expired date, User name & address.
Security problems.pptx
Security problems.pptx
Security problems.pptx
Security problems.pptx
Computer-related crime
 Refers to all the activities done with criminal intent in
cyberspace.
 It may be any crime that involves a computer/mobile and a
network. The computer may have been used in the commission
of a crime, or it may be the target.
Classification of Computer Crimes
Fraud and financial crimes.
Cyber terrorism.
Cyber extortion.
Cyber warfare.
Additionally, computer crime can be categorized as:
Individual
Property
Government
Types of Computer Crimes
 Hacking
 Denial of Service (DoS) Attack
 Cyber Stalking
 Identity Theft
 Malicious Software
 Child Soliciting and Abuse
 Computer Vandalism
 Software Piracy
 Virus Dissemination
Questions?

More Related Content

Security problems.pptx

  • 1. Security problems By: Asst. Lec. Afrah Salman Dawood
  • 2. Outline Internet based fraud Password hacking Viruses Encryption and decryption keys Firewalls Anti-virus software Digital Signatures and certificates Computer-related crime.
  • 3. Internet Fraud It is a type of fraud or deception which makes use of the internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance.
  • 4. Types of Internet Fraud Credit/ Debit Card Fraud Business Deceit Recruitment Cheque Scam Advance Fee Fraud Non-Delivery of Goods/ Service Fraud
  • 5. Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by computer system.
  • 6. Types of Password Hacking Website Hacking Network Hacking Ethical Hacking Email Hacking Password Hacking Online Banking Hacking Computer Hacking
  • 7. Viruses A virus is a small piece of software that piggybacks on real programs in order to get executed Once its running, it spreads by inserting copies of itself into other executable code or documents . Typical things that can do to PCs are: 1. Display a message 2. Erase files 3. Scramble data on a hard disk 4. Cause erratic screen behavior 5. Halt the PC 6. Many viruses do nothing obvious at all except spread!
  • 8. Types of Viruses Time Bomb Logical Bomb Worm Boot Sector Virus Macros Virus Trojan Horse
  • 9. Encryption and Decryption Encryption is the process of converting plaintext message into a ciphertext message. Decryption is the process of converting ciphertext message into a plaintext message. The same key must be used in both processes. The process of encryption and decryption is called cryptography. Key
  • 10. Types of Cryptography Keys A cryptographic key is a string of data that is used to lock or unlock cryptographic functions, including authentication, authorization and encryption. It is categorized according to how it will be used and what properties it has. It might have one of the following properties: Symmetric or Asymmetric, Public or Private. algorithms use separate keys for encryption and decryption algorithms use separate keys for encryption and decryption algorithms use separate keys for encryption and decryption algorithms use separate keys for encryption and decryption
  • 11. Firewalls It is a program or hardware device that filters the information coming through the internet connection into your private network or computer system. An application firewall is a special firewall that is specifically coded for the type of traffic it is inspecting and the most widely developed application is web application firewall.
  • 12. Types of Firewall Packet filtering firewall Circuit-level gateway Stateful inspection firewall Application-level gateway (aka proxy firewall) Next-generation firewall (NGFW)
  • 13. Anti-virus software It is a sw used to prevent, detect and remove all sorts of malware such as computer viruses, hijackers, Trojan horses, etc. Popular types of anti-viruses used today are: 1. Kaspersky Lab 2. McAfee Virus Scan 3. Avira Antivirus Software 4. Avast Antivirus Software 5. AVG Antivirus and Internet Security 6. Norton Antivirus Software 7. Panda Antivirus Software
  • 15. Digital Signatures and Certificates It is a type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. Digital signature schemes normally give two algorithms, one for signing which involves the user's secret or private key, and one for verifying signatures which involves the user's public key. The output of the signature process is called the "digital signature. Digital Certificate is a data with digital signature from one trusted Certification Authority (CA) or trusted third party. This data contains: Who owns this certificate, Who signed this certificate, The expired date, User name & address.
  • 20. Computer-related crime Refers to all the activities done with criminal intent in cyberspace. It may be any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • 21. Classification of Computer Crimes Fraud and financial crimes. Cyber terrorism. Cyber extortion. Cyber warfare. Additionally, computer crime can be categorized as: Individual Property Government
  • 22. Types of Computer Crimes Hacking Denial of Service (DoS) Attack Cyber Stalking Identity Theft Malicious Software Child Soliciting and Abuse Computer Vandalism Software Piracy Virus Dissemination