Title: Computer Security
1Computer Security
Peter Fedyszyn
2What is Computer Security?
- -Computer security is an area of computer science
which deals with the risks of control, related to
computer usage - -used to create a secure system that allows only
certain actions to be performed by the
appropriate user or source - -Actions include the operation of access,
modification, and storage/deletion. Example If
the user chose not to allow modification of a
file to others, he/she may have programmed
password or code security.
3Secure systems
- -A secure system on a computer begins in an
authorized state and will never enter an
unauthorized state. - -An un-secure system is a system performing tasks
without proper authorization. These tasks would
include access, modification, and deletion to
restricted files and pages.
4Prevention and detection methods
- Security programs can both prevent and detect
intrusions. - Prevention measures let you keep intruders from
accessing any part of your computer system. - Detection informs you whether or not someone
attempted to break into your system, if they were
successful, and what they may have done. - harmful codes include viruses, spyware, malware,
and other infected programs
5There are programs to help!
- Many computer companies manufacture programs to
rid harmful codes from a computer. Often, they
can detect or remove the problems at once. Some,
like Symantec, are a bit more effective and
popular.
6(No Transcript)
7 Firewall Protection
- -Firewall is a program that monitors what comes
in and out of a computer. - -regulates network traffic checking for
anything suspicious. - -If the site does not appear right, the
firewall may prevent its access or postpone and
look for proper clearance. - -records where each piece of information came
from - -You decide whats allowed in and what is not.
8Why YOUR Computer?
- There are countless reasons why someone would
want to infect your computer. Common ones
include - -credit card number usage
- -bank account information
- -file and program copying
- -any modifying that would benefit them
9Just as a burglar robs a house, someone can rob
your computer. Some of these people are like
salesmen. In hopes that someone will bite, they
bait their hooks with tempting messages like free
downloads or phony advertisements.
10 Dont be their next victim!
- Avoid downloading things like
- winning advertising
- free music
- free movies
- Pornography
- Anything you think is suspicious
- Lastly, buy and install a program to help detect
and rid your computer of harmful intrusions
11 Sources http//www.cert.org/homeusers/HomeComp
uterSecurity/ http//en.wikipedia.org/wiki/Compute
r_security http//www.alw.nih.gov/Security/