Transcript: Computer Security The term computer security is used frequently, but the content of a computer is vulnerable to few risks unless the computer is connected to other computers on a network. As the use of computer networks, especially the Internet, has become pervasive, the concept of computer security has expanded to denote issues pertaining to the networked use of computers and their resources. Authentication means that users are who they claim to be. Availability means that resources are accessible by authorized parties; "denial of service" attacks, which are sometimes the topic of national news, are attacks against availability. Authentication or availability Integrity means that information is protected against unauthorized changes that are not detectable to authorized users; many incidents of hacking compromise the integrity of databases and other resources. Integrity Confidentiality means that information cannot be access by unauthorized parties. Confidentiality is also known as secrecy or privacy. The major technical areas of computer security are usually represented by the initials CIA: Confidentiality. Integrity. Authentication or availability. Confidentiality General
Transcript: -6 hour battery life -The reason I like the Razer Blade is because it has lots of ram for gamming and a good battery life for using the internet. -The reason why an engineer would need a pc like this is because it is extremely powerful to run all of their programs. -Battery life, 7-8 hours -Has 64-128-256-512 GBs of SSD. -750 Gbs of SSD Business Student -4th generation Intel i7 processor that is very powerful and helps with graphics and battery Computer powerpoint Conclusion -200 GBs of Skydrive space for one year. -7-8 hours of battery life Price: $1799 -13.3'' Display -Very powerful, 4-8 GBs of ram. -8 GBs of ram Microsoft Surface Pro 2 -128 Gbs of SSD -4 GBs of ram Art Student Microsoft Surface Pro 2 Alienware 17 Price: $899-$1799 -The reason an art student would need this ultrabook is because it is extremely portable and has a good amount of ram to run art programs such as Photoshop along with good battery and decent storage for an art student. Razer Blade Engineer student Samsung series 9 Price: $1800 - Type and Touch cover are magnetic keyboards that attach at the bottom for fast typing. -Has peripherals, one USB 3.0, one microsdhx up to 64 GBs of extra space. -Intel i7 Haswell processor -Comes with 8 GBs of ram, upgradable to 16 My own computer -The reason why for the surface pro 2 is because a business student can get the Microsoft Office suite preloaded on it. -Up to 32 GBs of ram. Price: $1299
Transcript: COMPUTER SECURITY SECURITY BY DESIGN software obeys all security policies but it is not trustworthy software obeys all security policies and it is deemed as trustworthy trust no software,enforce it with unreliable security mechanisms trust no software,enforce it with reliable security mechanisms Did you know? computer secutity can also be used with hardware SECURE OPERATING SYSTEMS SECURE CODING not preferred due to coding defects =:APPLICATIONS:= 1.cloud computing security 2.aviation positioning pf security measures System correctness: Good input = Good output Security: Bad input = Bad output OMG!!!HOW CAN WE STOP THEM??? POINTER= not so used widely,because it may impose changes in system management SECURITY ARCHITECTURE What is Security? System Correctness: If user supplies expected input, system generates desired output Security: If attacker supplies unexpected input, system does not fail in certain ways MOST DANGEROUS DEFECT: "POINTERS"
Transcript: Defintion Physical Access A system can be accessed by breaking locks and into buildings in general, Impact: Vandalism, unauthorized access in what sometimes is considered sensitive and private information. How can this problem be solved? Biometrics (explain here) What is biometrics? How does a biometrics system work? What are the advantages of this? Are there any limitations? Guards Locks First Type of Access to a system Computer Security It determines the reliability and integrity of information and also the confidence of users in the computer systems The security architecture: the higher the quality the more secure a system is, the more reliable, fast, integrated. Why is it important? is here And one more thing... Thank you! Computer security involves protection of hardware, software, machines, and networks from unauthorized access, misuses or even malfunctions.
Transcript: Computer Security The action of hacking into telecommunications systems, esp. to obtain free calls. the act of gaining unauthorized access to telecommunication systems. Any barrier that is intended to thwart the spread of a destructive agent. A computer system or network that is designed to block unauthorized access. FIREWALL BACK DOOR APPLICATIONS The identification of a user in an server by using the internet and web sites. MY DEFINITION: MY DEFINITION WEB DEFINITIONS: MY DEFINITION: A way of entering to a system and steal data from the system MY DEFINITION: A back door is a means of access to a computer program that bypasses security mechanisms. Also called a trapdoor. An undocumented way of gaining access to a program MY DEFINITION: Are codes that can affect a compurter system in different ways, in which data can be eliminated or they can use you information in a currupt way. WEB DEFINITIONS: replacement of a single course of stonework by two or more lower courses. Use a computer to gain unauthorized access to data in a system PHREAKING COOKIES WEB DEFINITIONS: It is a system that helps the computer acting like a wall to prevent and get rid off virus before they can attack the computer system An infection or disease caused by such an agent. A piece of code that is capable of corrupting the system or destroying data. HACKING WEB DEFINITIONS MY DEFINITION WEB DEFINITIONS: It is a back door that helps you to enter to a system by traspassing a program. WEB DEFINITIONS A packet of data sent by an Internet server to identify the user or track their access to the server a short line of text that a web site puts on your computer's hard drive when you access the web site. VIRUS
Transcript: My favorite college football team! Oregon Ducks Javes Lewis Number 2 in the Nation! Number 1 in the league! the Ducks made it to the championship! Auburn won by 3 points.:( The championship game was not their best game. :( I still think UO is the best college football team though!
Transcript: Hackers they do this with no profit or sabotage Craker use their talent to infiltrate into the system networks with the objective of stole that information and sell them to bad people Firewall Password word that is use for: determine if the person is really the one that he says that why only the user should konw the password audits Data backup having a data backup is very useful if: you lost your computer you had been attacked by a virus or anything else, but is important to have one Warning tips Enter reliable services Each time you download something make shure you inspect it with an antivirus Make data backup Dont install program from an unknown location Change your passwords frequently Keep informate you about this things it flitrates the information that want to enter to the system if not they recieve a fine and is scorted to the autorities having access to such things could make the difference between failure and success Computer security they are not looking for making damage The company has the right to make a study to thier users to comprobate if them adquired the software legally they feel a sensation very especial while they infiltrate to a network. general terms industries and companies denpend on a computational systems and networks so they consider their information as general assets it determines if the content is allowed to enter or not definition it covers a huge area in computation and information processing with this sources they can calculate the Data integrity and high availability
Transcript: Computer Protection! By Mitchell Ungar Everything you do you on your computer maybe at harm, either from computer hackers, or just from anyone that might happen to find out a password. One of the most basic Questions What is Computer Security? Computer security is simple NOT ALLOWING UNAUTHORIZED USE OF YOUR COMPUTER!!! It's very simple on how to protect your computer from hackers. Create Passwords that only YOU will know. Don't tell OTHERS these passwords. Never save a password on your computer. Remember to ALWAYS log out before you leave a computer unattended. WIRELESS INTERNET Problems with Wireless Internet Everyone is going on wireless networks now. It is easy to set up, and too use, as long as you have a wireless card, or signal. The problem with wireless is that people forget to put PASSWORDS on these routers, making it easier for hackers to go into your computer, and steal information, or even your identity. What is Identity theft? Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Hackers are always finding ways to get on your computer. Hackers can steal everything from you. Money. Friends. Identity. They pretty much steal your WHOLE LIFE! Another video of Identity theft, true story..... Everything you put on the internet everyone can see. What ever you put on the internet stays on there, it is another life , and this is called your "cyber life". Your computer is always at risk, from hackers, friends, enemies, or just random person noticing that you didn't sign out. Someone can always find information about you and cause you trouble. But you know how to do the procautions you can do. Make GOOD Passwords Don't tell others about your password Log off anything that you are not using Delete your history DO NOT save passwords on your computer. Instant Messaging Facebook www.youtube.ca. http://typesofidentitytheft.com/ . http://www.sans.org/top-cyber-security-risks/ www.wikipedia.ca MySpace References
Description: Catch the eye and engage the imagination with this cool-looking Prezi proposal template. The bold, bright design and highly dynamic theme all but guarantee success for your next sales or marketing proposal. All Prezi presentation templates are easily customized.
Description: Storytelling is at the heart of great service. Use this stunning, customizable business presentation template to highlight employees who do exceptional work or position your customers as the heroes of your business.
Description: The sky’s the limit. Boost your new sales initiative into orbit with an engaging and compelling SKO presentation. This template features a effective sales kickoff theme that makes it easy to be engaging. Like all Prezi SKO templates, it’s fully customizable with your own information.
Now you can make any subject more engaging and memorable