You are on page 1of 34

COMPUTER

SCIENCE

LEARNING
PRESENTATION
WELCOME
SUBSCRIBE
PARINAY
TO MY SETH
PRESENTATION
NETWORK SECURITY
CONCEPTS
INTRODUCTION
• Network security is an activity designed to
MESSAGES
protect the usability and integrity of your
network and data.
• Network security involves the authorization
HEY WHAT’S UP!!
of access to data in a network, which is YEAH GOOD

controlled by the network administrator. YEAH GOOD SEND


Q W E R T Y U I O P
A S D F G H J K L
Z X C V B N M
SPACE
``
HOW DOES NETWORK SECURITY WORK?
• It targets a variety of threats
and stops them from entering
or spreading on your network.
• Each network security layer
implements policies and
controls.
• Authorized users gain access
to network resources, but
``
malicious actors are blocked
from carrying out exploits and
threats.
WHY WE NEED SECURITY?
• Unless it’s properly secured, any
network is vulnerable to malicious
use and accidental damage.
• The majority of common attacks
against networks are designed to
gain access to information, by
spying on the communications and
data of users, rather than to
``
damage the network itself.
WAYS TO HAVE SECURED NETWORK
VIRUSES
TYPES | THREATS | PREVENTION
INTRODUCTION / TYPES
A computer virus is a type of malicious
software that, when executed, replicates itself
by modifying other computer programs and
inserting its own code.

TYPES
• File Virus
• Boot sector virus
• Macro virus ``
SYMPTOMS & PREVENTION
SYMPTOMS
• Takes longer time to load applications.
• Shows unpredictable program behavior.
• Shows inexplicable changes in file sizes.
• Strange graphics appearing on your
screen.
PREVENTION
• Install Anti-Virus/Malware Software. ``

• Secure Your Network.


• Think Before You Click.
WORMS
TYPES | SYMPTOMS | PREVENTION
INTRODUCTION / TYPES
Worm is also a malicious program like a virus. .
It uses security holes in a computer networks
to replicate itself.

TYPES
• Email.
• Instant messaging (IM).
• Internet relay chat (IRC).
• File sharing. ``

• Internet.
SYMPTOMS & PREVENTION
SYMPTOMS
• Slow computer performance.
• Freezing/crashing.
• Programs opening & running automatically.
• Missing/modified files.
PREVENTION
• Use a personal firewall to block external
access to network services. ``
• You should use care when clicking on links
in social media and email messages.
TORJON HORSE
TYPES | SYMPTOMS | PREVENTION
INTRODUCTION / TYPES
A Trojan horse is a program that contains hidden
malicious functions. It trick users into installing them
by appearing to be genuine programs. Once
installed on a system, they reveal their true nature
and cause damage.
Types
• Trojan-Banker
• Trojan-DdoS
``
• Trojan-Downloader
• Trojan-Dropper
• Trojan-Game Thief
SYMPTOMS & PREVENTION
SYMPTOMS
• Unexpected pop-up windows.
• Crashes and error messages.
• Suspicious hard drive activity.
• Slow start up and slow performance.
PREVENTION
• Do regular backup of system.
• Scan all email attachment with an
``
anti virus before opening it.
• Never open Instant Message (IM)
attachments from unknown people.
SPAMS
INTRODUCTION
INTRODUCTION
The term spam means endless
repetition of worthless text. In
other words, unwanted messages
or mails are known as Spam. At
times internet is flooded with
multiple copies of the same
message, it is nothing but spam.

``
COOKIES
INTRODUCTION
INTRODUCTION
A cookie is a text file that a Web
browser stores on a user’s machine.
They are used by websites for
authentication, storing website
information/ preferences, other
browsing information

``
FIREWALL
INTRODUCTION
INTRODUCTION
A firewall is software used to
maintain the security of a private
network. They unauthorized access
to or from private networks and are
often employed to prevent
unauthorized Web users or illicit
software from gaining access to
private networks connected to the
Internet. ``
CYBER CRIME
INTRODUCTION
INTRODUCTION
Cybercrime is defined as a crime in which
a computer and internet is used in an
illegitimate way to harm
the user.
The list of Cyber Crimes includes:-
• Hacking.
• Cyberstalking.
• Online identity theft.
• Online child abuse. ``

• Ransomware attack.
• Internet fraud.
CYBER LAW
INTRODUCTION | IT ACT
INTRODUCTION
Cyber law is an attempt to integrate the challenges presented
by human activity on the internet with legal system of laws
applicable to the physical world.

``
INFORMATION TECHNOLOGY ACT
INFORMATION TECHNOLOGY ACT,
2000" [ITA-2000] was enacted by
Parliament of India to protect the field
of e-commerce, e-governance, e-
banking as well as penalties and
punishments in the field of Cyber
Crimes

``
INTELLECTUAL PROPERTY
RIGHTS (IPR) ISSUES
INTRODUCTION
Intellectual property rights are the
rights given to an individual over the
invention of their own. They usually
give the creator an exclusive right over
the use of his/her creation for a certain
period of time..

``
WAYS TO PROTECT INTELLECTUAL PROPERTY
1. Copyrights
Copyright is the term used for a written
document. A legal action can be taken, if
copyrights are violated.

2. Trademarks
Trademark can be defined as a name or a
different sign or a device identifying a product ``

or a service.
WAYS TO PROTECT INTELLECTUAL PROPERTY
3. Patents
A Patent is a term used for a specific
product designed by an individual.
The designer is given exclusive rights
over the patent for a limited period of
time

``
HACKING
INTRODUCTION | TYPES
INTRODUCTION
A computer enthusiast, who uses his computer programming skills
to intentionally access a computer without authorization is known
as hacking. The computer enthusiast involved in this activity is
known as a hacker.

``
TYPES OF HACKING
• Website Hacking.
• Network Hacking.
• Ethical Hacking.
• Email Hacking.
• Password Hacking.
• Online Banking Hacking.
• Computer Hacking.

``

You might also like