IT - Computer security and risk - part 2

ShahadAlAli6 33 views 19 slides Aug 27, 2025
Slide 1
Slide 1 of 19
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19

About This Presentation

Computer security and risks part 2


Slide Content

 
   
 
Computer Security & Risks
Chapter 11 Part 2

 
   
Physical Access Restriction
Something You Have
Key Access Card
Something You Know
Password Lock Combination
Something You Do
Signature Typing speed and error pattern
Something About You
Voice Print Fingerprint Retinal Scan
3
Security Biometrics:
Identification of humans
by their unique traits  
 
 

 
   
Passwords
•Most common tool used to restrict access to computers
 
•Effective Passwords:
- Not real words        
- Changed frequently    
4
Password Rules Weak Strong
Passwords should have more than 8 characters
With numbers, symbols, upper and lower case
letters
password
12345678
 
Mtwf!382
GatsbJ11*)
Don’t use a password someone can guess, such
as your name, birthday.
Saeed1994
1stMarJohn
S@ed#1$9
13j*nUiM

 
   
Access Privileges
•Access Control Software
▫Doesn’t need to treat all users
identically
▫e.g. At least one of the
accounts on a PC must be
Administrator, which has
additional privileges:
•Permission to install
additional software
•Change system settings
5

 
   
Firewalls
•Protect from hackers
•It filters information
between a private system
and the rest of the internet.
 
•It could be either:
▫Software program
▫Hardware device
▫Both together
 
6

 
   
Encryption
•Scrambling transmitted messages to secure them
using a secret code called Key
 
•Reverse process to retrieve original message is
called Decryption
 
7

 
   
8
Left-shift & Right-shift Encryption
Left Key: Replace every letter with the 5th letter before it.
Right Key: Replace every letter with the 5th successive letter.

 
   
Protection & Prevention
•Anti-virus Software
▫Protect computer/files from harm
▫Detect viruses and delete them
▫Run scheduled scans in the
background
▫Needs to be frequently revised for
new viruses
▫Days required to develop patches
for new viruses
 
9

 
   
Audit Control Software
•Monitoring and recording user’s computer
transactions
▫Tracing and identifying suspicious computer activity
 
10

 
   
Backups & Other Precautions
•Uninterrupted Power Supply (UPS)
▫Protects  data loss due to Power failure
 
 
 
•Surge Protector
▫Shields electronic equipment from
dangerous power spikes
 
11

 
   
Backups & Other Precautions
•Backups are used to replace originals
•Best data recovery insurance is Regular Backups
•Backup storage:
▫Online in the cloud – remote storage
▫Off-site – hard drives or flash drives stored in remote
locations
▫Backup drive in laptops, external hard drives, network
storage
 
•Types of backups:
▫Incremental: only new files or modified files
12

•Happens more or less continuously e.g. Hourly,
 
   
Safe Computing
•If it’s important, back it up.
•If it’s sensitive, lock it up.
•If you’re sending sensitive
information, consider
encryption.
•Beware of email bearing
gifts.
 
•Share with care.
•Handle shareware and
freeware with care.
•Don’t pirate software.
•Disinfect regularly.
•Take your passwords
seriously.
13

 
   
Security vs Privacy
•Security measures prevent crime but
they can also threaten privacy
•Smart badges
▫broadcast identification codes
▫A badge-location database stores data about the
location of the badge (or person)
▫Instead of paging the entire hospital, an
operator could route the call.
•Smart phones have proximity
recognition technology
 
14

 
   
UAE Cybercrime Law
•UAE Cybercrime Law No 5 of 2012
▫Any form of misuse of a computer/smart device or an
electronic network/system
 
▫Stern punishments that could go up to a life sentence
and/or a fine varying between Dh50,000 and Dh3 million
depending the severity and seriousness of the cybercrime
•E.g. breaching someone’s privacy by copying, saving or
publishing their photo or personal data using an electronic
device is an offence punishable by at least six months in prison
and/or a fine of up to Dh500,000, even if the photo was taken
in a public place.
15

 
   
Security & Reliability
•Software Bugs
▫It cause more damage than viruses
•It is impossible to eliminate all bugs
▫The bigger the system the bigger the problem
 
 
16

 
   
Google search Engine - 2010
17

 
   
Security & Reliability
•Y2K Bug
▫For decades only two digits were
used for year; e.g.  (89 1989)
▫But in 2000 it would become 00
causing calculation errors.
•More than 100 billion dollars
spent to avert the disaster
▫Many programs had to be changed
 
18

 
   
Computers at War
•Smart weapons
▫Missiles that use
computerized guidance
systems to locate their
targets
•Autonomous system
▫Complex system that
can assume almost
complete responsibility
for a task without
human input
19

 
   
Computers at War: Cyber Warfare
•By attacking computer networks the enemy can cripple:
▫Telecommunications
▫Power grids
▫Water and gas supplies
 
20
Tags