Data loss causes and its threatsPresentation Transcript
Data Loss Causes & Threats
Whole Family of Viruses
Sabotage / Hacking / Back Door Programs
A program or malicious piece of code created for destructive reasons
Now days categorised with spread range
Which affects LAN and small interconnecting LAN is termed as low threat like, joshi,shankar macro viruses
Affecting a region or country is termed is medium threat for eg. Vbs.loveletter, W32.bugbear
Global widespread is termed as High Threat for eg. Mellisa, NIMDA, KLEZ, MYDOOM
Lets Know More about them !!
Are message alerts warning users about new unknown viruses or Trojan programs. These messages "inform" that there is a new type of virus spreading through the Internet channels and/or e-mail and destroying information on affected computers.
These messages are deliberately false and started by people with malicious intentions. The duped users then pass these messages to other people thinking they are helping them to protect themselves against a new danger. Usually, the text of these fake "new virus" messages is written in panicky script and may appear as an example of the following:
WARNING!!! If you receive an e-mail titled "JOIN THE CREW" DO NOT open it! It will erase EVERYTHING on your hard drive! Send this letter out to as many people you can....this is a new virus and not many people know about it! There are other variants of such messages reporting about viruses in non-executable data files (graphic and sound files), in the CMOS and BIOS, etc.
Always see the latest hoaxes list from these websites
The possibility of incorporating a file virus into virtually any executable of virtually any popular OS does exist. As of today, there are known viruses infecting all kinds of executables of standard DOS: batch command files (BAT), loadable drivers (SYS, including special purpose files IO.SYS and MS- DOS.SYS) and binary executables (EXE, COM). There also exist viruses targeting executables of other operating systems - Windows 3.x, Windows95/NT, OS/2, Macintosh, Unix, including the VxD drivers of Windows 3.x and Windows95.
1. Access Macro Viruses - new generation of infectors
2. AmiPro Macro Viruses
3. Excel Macro Viruses
4. Excel4 Macro Viruses
5. Excel97 Macro Viruses
6. Excel97/Word97 Macro Viruses
7. PowerPoint Macro Viruses
8. Visio Macro Viruses
11. Word Macro Viruses
12. Word2000 Macro Viruses
13. Word97 Macro Viruses
The impossibility to convert the infected document in any other format.
The impossibility to save the document in any other subdirectory/disk by using the "Save As" command.
The infected documents have the Template internal format. During infection, the documents are converted by the viruses from Microsoft Document into Template format.
They are generally called as backdoor programs, these are generally small scripts or codes, which are passed through internet or an email, once it infects the machines the program starts looking for open network ports and starts working as directed by the coder.
What it steals
Your Keystrokes are recorded and mailed for entire login session, which includes your passwords and other personal information
Your data is on serious risk, as data can be deleted and copied or modified
And lot many other activities can be performed by the coder. Some common trojans are Back Orifice, Trojan.js.deltree.y
Most deadliest, unavoidable and widely spreading form of virus
How it spreads ?
Has it’s own SMTP engine.
Monitors all the email addresses of the infected machine.
Attaches itself to registry control for any antivirus and disables it.
How it affects ? Infected machine user : mac Email Id’s in Address book Like [email_address] + Internet Connectivity Worm Mail to [email_address] from : email@example.com Mail to [email_address] from : [email_address] + data file attached
We hear users saying
“ Oh I accidentally formatted my data partition.
Please help I have deleted my photographs and emptied them from recycle bin.
Most of our international and ESD user(s) have been reporting the cause of the crash and most amazingly they were responsible for the cause of crash, we receive 100 – 300 mails for data loss per week and 60 –70 % are human error.
This can be done by a disgruntled employee
Hackers (For Fun)
Hacking Hacker Remote FTP Server Remote HTTP Server LAN ICQ, Yahoo, MSN Chat
Organizations prepare disaster management techniques to overcome such situations.
Decentralized form of Internet also helps to overcome such situation.