Faculty of computer engineering information security direction


Presentation on theme: "IT Security ."— Presentation transcript


Download 140.78 Kb.
bet2/3
Sana04.11.2023
Hajmi140.78 Kb.
#1747362
1   2   3
Bog'liq
3 self-studyC

Presentation on theme: "IT Security ."— Presentation transcript:


1 IT Security
2 Threats: A threat is anything that can cause harm.
 Countermeasures: A countermeasure is any step you take to ward off a threat – to protect yourself, your data, or your computer from harm.
3 Threats to UsersIdentity Theft : Identity theft occurs when someone impersonates you by using your name, social security number, or other personal information to obtain documents or credit in your name.
4 MethodsShoulder surfingSnaggingDumpster DivingSocial EngineeringHigh tech methods
5 Online spying toolsCookies: A cookie is a small text file that a web server asks your browser to place on your computer. The cookie contains information identifies your computer (IP address), you(use name or address) & information about your visit to the web site.
6 A Cookie can record- Last time you visited the web site- Pages you downloaded- Time you spent before leaving
7 Web Bugs: A web bug is a small image file that can be embedded in a web page or an HTML format message. It allows the bug’s creator to track many of your online activities.
8 A web bug can record- Web pages you viewKeywords you type in a search enginePersonal Information you enter in a form of web pages
9 SpywareThe term spyware is used to refer to many different kinds of software that can track a computer user’s activities and report them to someone else. Spyware can record individual keystrokes, web usages, addresses, personal information. Generally the program transmits the collected data via or web page.
10 SpamSpam is junk sent by an organization or individual to a mass audience of Internet users who have expressed no interest in the product or service being marketed. The correct term for spam is unsolicited commercial (UCE)
11 Threats to HardwarePower related threatsPower problems affect computers in two ways:1. Power fluctuations2. Power failure
12 Theft and VandalismA burglar or vandal can do tremendous damage to a Computer, resulting in total loss of the system and the data it stores. The best way to keep thieves and vandals Theft and at bay is to keep you system in a secure area. Special locks are available that can attach a
13 
Download 140.78 Kb.

Do'stlaringiz bilan baham:
1   2   3




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling