Data Loss Causes & Threats
Causes <ul><li>Whole Family of Viruses </li></ul><ul><li>Human Error </li></ul><ul><li>Sabotage / Hacking / Back Door Prog...
VIRUS <ul><li>A program or malicious piece of code created for destructive reasons </li></ul><ul><li>Now days categorised ...
Lets Know More about them !!
Computer hoaxes  <ul><li>Are message alerts warning users about new unknown viruses or Trojan programs. These messages &qu...
Computer Hoaxes <ul><li>Always see the latest hoaxes list from these websites </li></ul><ul><li>http://www.datafellows.com...
File Viruses <ul><li>The possibility of incorporating a file virus into virtually any executable of virtually any popular ...
Macro Viruses <ul><li>1.  Access Macro Viruses - new generation of infectors </li></ul><ul><li>2.  AmiPro Macro Viruses </...
Macro Viruses <ul><li>The impossibility to convert the infected document in any other format.  </li></ul><ul><li>The impos...
Trojans <ul><li>They are generally called as backdoor programs, these are generally small scripts or codes, which are pass...
Trojan <ul><li>What it steals </li></ul><ul><ul><li>Your Keystrokes are recorded and mailed for entire login session, whic...
Worms <ul><li>Most deadliest, unavoidable and widely spreading form of virus </li></ul>
Worms <ul><li>How it spreads ? </li></ul><ul><ul><li>Has it’s own SMTP engine. </li></ul></ul><ul><ul><li>Monitors all the...
How it affects ? Infected machine user : mac Email Id’s in Address book Like  [email_address]   + Internet Connectivity Wo...
Human Error  <ul><li>We hear users saying  </li></ul><ul><li>“ Oh I accidentally formatted my data partition. </li></ul><u...
Case Study <ul><li>Most of our international and ESD user(s) have been reporting the cause of the crash and most amazingly...
Sabotage <ul><li>This can be done by a disgruntled employee </li></ul><ul><li>Competition  </li></ul><ul><li>Hackers (For ...
Hacking Hacker Remote FTP Server Remote HTTP Server LAN ICQ, Yahoo, MSN Chat
Natural Disaster <ul><li>Organizations prepare disaster management techniques to overcome such situations. </li></ul><ul><...
Upcoming SlideShare
Loading in …5
×

Data loss causes and its threats

529 views
467 views

Published on

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
529
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Data loss causes and its threats

  1. 1. Data Loss Causes & Threats
  2. 2. Causes <ul><li>Whole Family of Viruses </li></ul><ul><li>Human Error </li></ul><ul><li>Sabotage / Hacking / Back Door Programs </li></ul><ul><li>Natural Disaster </li></ul>
  3. 3. VIRUS <ul><li>A program or malicious piece of code created for destructive reasons </li></ul><ul><li>Now days categorised with spread range </li></ul><ul><ul><li>Which affects LAN and small interconnecting LAN is termed as low threat like, joshi,shankar macro viruses </li></ul></ul><ul><ul><li>Affecting a region or country is termed is medium threat for eg. Vbs.loveletter, W32.bugbear </li></ul></ul><ul><ul><li>Global widespread is termed as High Threat for eg. Mellisa, NIMDA, KLEZ, MYDOOM </li></ul></ul>
  4. 4. Lets Know More about them !!
  5. 5. Computer hoaxes <ul><li>Are message alerts warning users about new unknown viruses or Trojan programs. These messages &quot;inform&quot; that there is a new type of virus spreading through the Internet channels and/or e-mail and destroying information on affected computers. </li></ul><ul><li>These messages are deliberately false and started by people with malicious intentions. The duped users then pass these messages to other people thinking they are helping them to protect themselves against a new danger. Usually, the text of these fake &quot;new virus&quot; messages is written in panicky script and may appear as an example of the following: </li></ul><ul><li>WARNING!!! If you receive an e-mail titled &quot;JOIN THE CREW&quot; DO NOT open it! It will erase EVERYTHING on your hard drive! Send this letter out to as many people you can....this is a new virus and not many people know about it! There are other variants of such messages reporting about viruses in non-executable data files (graphic and sound files), in the CMOS and BIOS, etc. </li></ul>
  6. 6. Computer Hoaxes <ul><li>Always see the latest hoaxes list from these websites </li></ul><ul><li>http://www.datafellows.com/news/hoax/ </li></ul><ul><li>http://kumite.com/myths/ </li></ul>
  7. 7. File Viruses <ul><li>The possibility of incorporating a file virus into virtually any executable of virtually any popular OS does exist. As of today, there are known viruses infecting all kinds of executables of standard DOS: batch command files (BAT), loadable drivers (SYS, including special purpose files IO.SYS and MS- DOS.SYS) and binary executables (EXE, COM). There also exist viruses targeting executables of other operating systems - Windows 3.x, Windows95/NT, OS/2, Macintosh, Unix, including the VxD drivers of Windows 3.x and Windows95. </li></ul><ul><li>Die_Hard, Wrzod </li></ul>
  8. 8. Macro Viruses <ul><li>1. Access Macro Viruses - new generation of infectors </li></ul><ul><li>2. AmiPro Macro Viruses </li></ul><ul><li>3. Excel Macro Viruses </li></ul><ul><li>4. Excel4 Macro Viruses </li></ul><ul><li>5. Excel97 Macro Viruses </li></ul><ul><li>6. Excel97/Word97 Macro Viruses </li></ul><ul><li>7. PowerPoint Macro Viruses </li></ul><ul><li>8. Visio Macro Viruses </li></ul><ul><li>11. Word Macro Viruses </li></ul><ul><li>12. Word2000 Macro Viruses </li></ul><ul><li>13. Word97 Macro Viruses </li></ul>
  9. 9. Macro Viruses <ul><li>The impossibility to convert the infected document in any other format. </li></ul><ul><li>The impossibility to save the document in any other subdirectory/disk by using the &quot;Save As&quot; command. </li></ul><ul><li>The infected documents have the Template internal format. During infection, the documents are converted by the viruses from Microsoft Document into Template format. </li></ul>
  10. 10. Trojans <ul><li>They are generally called as backdoor programs, these are generally small scripts or codes, which are passed through internet or an email, once it infects the machines the program starts looking for open network ports and starts working as directed by the coder. </li></ul>
  11. 11. Trojan <ul><li>What it steals </li></ul><ul><ul><li>Your Keystrokes are recorded and mailed for entire login session, which includes your passwords and other personal information </li></ul></ul><ul><ul><li>Your data is on serious risk, as data can be deleted and copied or modified </li></ul></ul><ul><ul><li>And lot many other activities can be performed by the coder. Some common trojans are Back Orifice, Trojan.js.deltree.y </li></ul></ul>
  12. 12. Worms <ul><li>Most deadliest, unavoidable and widely spreading form of virus </li></ul>
  13. 13. Worms <ul><li>How it spreads ? </li></ul><ul><ul><li>Has it’s own SMTP engine. </li></ul></ul><ul><ul><li>Monitors all the email addresses of the infected machine. </li></ul></ul><ul><ul><li>Attaches itself to registry control for any antivirus and disables it. </li></ul></ul>
  14. 14. How it affects ? Infected machine user : mac Email Id’s in Address book Like [email_address] + Internet Connectivity Worm Mail to [email_address] from : mac@other.com Mail to [email_address] from : [email_address] + data file attached
  15. 15. Human Error <ul><li>We hear users saying </li></ul><ul><li>“ Oh I accidentally formatted my data partition. </li></ul><ul><li>Please help I have deleted my photographs and emptied them from recycle bin. </li></ul>
  16. 16. Case Study <ul><li>Most of our international and ESD user(s) have been reporting the cause of the crash and most amazingly they were responsible for the cause of crash, we receive 100 – 300 mails for data loss per week and 60 –70 % are human error. </li></ul>
  17. 17. Sabotage <ul><li>This can be done by a disgruntled employee </li></ul><ul><li>Competition </li></ul><ul><li>Hackers (For Fun) </li></ul>
  18. 18. Hacking Hacker Remote FTP Server Remote HTTP Server LAN ICQ, Yahoo, MSN Chat
  19. 19. Natural Disaster <ul><li>Organizations prepare disaster management techniques to overcome such situations. </li></ul><ul><li>Decentralized form of Internet also helps to overcome such situation. </li></ul>

×