Security System Ability of a system to protect information and system resources with respect to...
-
Upload
lenard-eaton -
Category
Documents
-
view
213 -
download
0
Transcript of Security System Ability of a system to protect information and system resources with respect to...
![Page 1: Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ecb5503460f94bd9c23/html5/thumbnails/1.jpg)
Security System
Ability of a system to protect
information and system resources
with respect to confidentiality and
integrity.
![Page 2: Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ecb5503460f94bd9c23/html5/thumbnails/2.jpg)
Components of Security System
Confidentiality
Integrity
Authentication
![Page 3: Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ecb5503460f94bd9c23/html5/thumbnails/3.jpg)
Components of Security System
Access Control
Non - repudiation
Availability
Privacy
![Page 4: Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ecb5503460f94bd9c23/html5/thumbnails/4.jpg)
Threats to Computer Security
A threat is a potential violation of
security.
![Page 5: Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ecb5503460f94bd9c23/html5/thumbnails/5.jpg)
Computer Viruses
Worms
Trojan Horses
![Page 6: Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ecb5503460f94bd9c23/html5/thumbnails/6.jpg)
Viruses can do the following if unchecked
Damage or delete files
Slow down the computer
Invade your E-Mail program
![Page 7: Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ecb5503460f94bd9c23/html5/thumbnails/7.jpg)
Spyware
Compromises your data
Alters PC Setting
Slow down computer
![Page 8: Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ecb5503460f94bd9c23/html5/thumbnails/8.jpg)
Adware
Track yore information just like
spyware
Display arrays of annoying
advertisements
Slow down computer
![Page 9: Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ecb5503460f94bd9c23/html5/thumbnails/9.jpg)
Spamming
Spam reduces productivity
Spasm eats up your time
Spam can lead to worse things
![Page 10: Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ecb5503460f94bd9c23/html5/thumbnails/10.jpg)
PC Intrusion
Sweeper Attack
Denial of Services
Password Guessing
![Page 11: Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ecb5503460f94bd9c23/html5/thumbnails/11.jpg)
Phishing
It is the criminally fraudulent process of
attempting to acquire sensitive
information such passwords, credit
card details etc.
![Page 12: Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ecb5503460f94bd9c23/html5/thumbnails/12.jpg)
Solutions to Security Threats
Active Protection
Preventive Measures
![Page 13: Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ecb5503460f94bd9c23/html5/thumbnails/13.jpg)
Active Protection
Use Anti – Virus and Anti Spyware
software
Download updates regularly
Run frequent system scans
![Page 14: Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ecb5503460f94bd9c23/html5/thumbnails/14.jpg)
Preventive Measures
Keep your system up to date
Use caution when downloading files
Be careful with E-Mails
Disable cookies, if possible