Your SlideShare is downloading. ×
Data loss causes and its threats
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Data loss causes and its threats


Published on

Published in: Technology, Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Data Loss Causes & Threats
  • 2. Causes
    • Whole Family of Viruses
    • Human Error
    • Sabotage / Hacking / Back Door Programs
    • Natural Disaster
  • 3. VIRUS
    • A program or malicious piece of code created for destructive reasons
    • Now days categorised with spread range
      • Which affects LAN and small interconnecting LAN is termed as low threat like, joshi,shankar macro viruses
      • Affecting a region or country is termed is medium threat for eg. Vbs.loveletter, W32.bugbear
      • Global widespread is termed as High Threat for eg. Mellisa, NIMDA, KLEZ, MYDOOM
  • 4. Lets Know More about them !!
  • 5. Computer hoaxes
    • Are message alerts warning users about new unknown viruses or Trojan programs. These messages "inform" that there is a new type of virus spreading through the Internet channels and/or e-mail and destroying information on affected computers.
    • These messages are deliberately false and started by people with malicious intentions. The duped users then pass these messages to other people thinking they are helping them to protect themselves against a new danger. Usually, the text of these fake "new virus" messages is written in panicky script and may appear as an example of the following:
    • WARNING!!! If you receive an e-mail titled "JOIN THE CREW" DO NOT open it! It will erase EVERYTHING on your hard drive! Send this letter out to as many people you can....this is a new virus and not many people know about it! There are other variants of such messages reporting about viruses in non-executable data files (graphic and sound files), in the CMOS and BIOS, etc.
  • 6. Computer Hoaxes
    • Always see the latest hoaxes list from these websites
  • 7. File Viruses
    • The possibility of incorporating a file virus into virtually any executable of virtually any popular OS does exist. As of today, there are known viruses infecting all kinds of executables of standard DOS: batch command files (BAT), loadable drivers (SYS, including special purpose files IO.SYS and MS- DOS.SYS) and binary executables (EXE, COM). There also exist viruses targeting executables of other operating systems - Windows 3.x, Windows95/NT, OS/2, Macintosh, Unix, including the VxD drivers of Windows 3.x and Windows95.
    • Die_Hard, Wrzod
  • 8. Macro Viruses
    • 1. Access Macro Viruses - new generation of infectors
    • 2. AmiPro Macro Viruses
    • 3. Excel Macro Viruses
    • 4. Excel4 Macro Viruses
    • 5. Excel97 Macro Viruses
    • 6. Excel97/Word97 Macro Viruses
    • 7. PowerPoint Macro Viruses
    • 8. Visio Macro Viruses
    • 11. Word Macro Viruses
    • 12. Word2000 Macro Viruses
    • 13. Word97 Macro Viruses
  • 9. Macro Viruses
    • The impossibility to convert the infected document in any other format.
    • The impossibility to save the document in any other subdirectory/disk by using the "Save As" command.
    • The infected documents have the Template internal format. During infection, the documents are converted by the viruses from Microsoft Document into Template format.
  • 10. Trojans
    • They are generally called as backdoor programs, these are generally small scripts or codes, which are passed through internet or an email, once it infects the machines the program starts looking for open network ports and starts working as directed by the coder.
  • 11. Trojan
    • What it steals
      • Your Keystrokes are recorded and mailed for entire login session, which includes your passwords and other personal information
      • Your data is on serious risk, as data can be deleted and copied or modified
      • And lot many other activities can be performed by the coder. Some common trojans are Back Orifice, Trojan.js.deltree.y
  • 12. Worms
    • Most deadliest, unavoidable and widely spreading form of virus
  • 13. Worms
    • How it spreads ?
      • Has it’s own SMTP engine.
      • Monitors all the email addresses of the infected machine.
      • Attaches itself to registry control for any antivirus and disables it.
  • 14. How it affects ? Infected machine user : mac Email Id’s in Address book Like [email_address] + Internet Connectivity Worm Mail to [email_address] from : Mail to [email_address] from : [email_address] + data file attached
  • 15. Human Error
    • We hear users saying
    • “ Oh I accidentally formatted my data partition.
    • Please help I have deleted my photographs and emptied them from recycle bin.
  • 16. Case Study
    • Most of our international and ESD user(s) have been reporting the cause of the crash and most amazingly they were responsible for the cause of crash, we receive 100 – 300 mails for data loss per week and 60 –70 % are human error.
  • 17. Sabotage
    • This can be done by a disgruntled employee
    • Competition
    • Hackers (For Fun)
  • 18. Hacking Hacker Remote FTP Server Remote HTTP Server LAN ICQ, Yahoo, MSN Chat
  • 19. Natural Disaster
    • Organizations prepare disaster management techniques to overcome such situations.
    • Decentralized form of Internet also helps to overcome such situation.