0% found this document useful (0 votes)
52 views

Prepared By: Fareed Khan Tareen

The document discusses computer security and countermeasures. It defines computer security as the process of protecting computers, hardware, and software from unauthorized use and access. It describes common security threats like viruses, worms, Trojan horses, and malware. It then discusses countermeasures, which are actions, devices, procedures, or techniques that reduce threats, vulnerabilities, or attacks. Some examples of countermeasures mentioned are security by design, security architecture, security measures, and security operating systems.

Uploaded by

Fareed Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Prepared By: Fareed Khan Tareen

The document discusses computer security and countermeasures. It defines computer security as the process of protecting computers, hardware, and software from unauthorized use and access. It describes common security threats like viruses, worms, Trojan horses, and malware. It then discusses countermeasures, which are actions, devices, procedures, or techniques that reduce threats, vulnerabilities, or attacks. Some examples of countermeasures mentioned are security by design, security architecture, security measures, and security operating systems.

Uploaded by

Fareed Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Prepared by: Fareed Khan Tareen Page 1

 A computer is an electronic device that stores and processes data, and can be
programmed with instructions. It manipulates information, or data.
 Charles Babbage, an English mechanical engineer, originated the concept of a
programmable computer. He invented the first mechanical computer in the early
19th century and considered the “Father of the Computer”.

Computer Security
Computer security is also known as IT or Cyber security. Computer security is a
process of protection of computer, hardware and software. In this process,of
preventing and detecting un-authorized use of computer. It involves the process of
safeguard against intrades from using your computer resources form even gaining
access to them accidentally.

Vulnerabilities and Attacks


Malicious Software: Viruses, Worms, Trojan Horses, and
Spyware
Malware
Viruses

 Rogue software program that attaches itself to other software programs or


data files in order to be executed

Worms

 Independent computer programs that copy themselves from one computer to


other computers over a network.
Prepared by: Fareed Khan Tareen Page 2
Trojan horses

 Software program that appears to be benign but then does something other
than expected.

Click jacking
 Click jacking, also known as "UI redress attack" or "User Interface redress
attack", is a malicious technique in which an attacker tricks a user into clicking
on a button or link on another webpage while the user intended to click on the
top level page. This is done using multiple transparent or opaque layers.

Spoofing
 Redirecting Web link to address different from intended one, with site
masquerading as intended destination

Phishing
 Setting up fake Web sites or sending e-mail messages that look like legitimate
businesses to ask users for confidential personal data

Pharming
 Redirects users to a bogus Web page, even when individual types correct Web
page address into his or her browser

Click fraud
 Occurs when individual or computer program fraudulently clicks on online ad
without any intention of learning more about the advertiser or making a
purchase

Countermeasure
In computer security a countermeasure is an action, device, procedure, or technique
that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by

Prepared by: Fareed Khan Tareen Page 3


minimizing the harm it can cause, or by discovering and reporting it so that
corrective action can be taken.

Some common countermeasures are listed in the following sections:

Security by design
 Security by design, or alternately secure by design, means that the software
has been designed from the ground up to be secure. In this case, security is
considered as a main feature.

Security architecture
 The Open Security Architecture organization defines IT security architecture
as "the design artifacts that describe how the security controls (security
countermeasures) are positioned, and how they relate to the overall
information technology architecture.

Security Measures
 A state of computer "security" is the conceptual ideal, attained by the use of
the three processes: threat prevention, detection, and response.

Security Operating Systems


 One use of the term "computer security" refers to technology that is used to
implement secure operating systems.

Prepared by: Fareed Khan Tareen Page 4


Prepared by: Fareed Khan Tareen Page 5

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy