• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Data loss causes and its threats
 

Data loss causes and its threats

on

  • 537 views

 

Statistics

Views

Total Views
537
Views on SlideShare
537
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Data loss causes and its threats Data loss causes and its threats Presentation Transcript

    • Data Loss Causes & Threats
    • Causes
      • Whole Family of Viruses
      • Human Error
      • Sabotage / Hacking / Back Door Programs
      • Natural Disaster
    • VIRUS
      • A program or malicious piece of code created for destructive reasons
      • Now days categorised with spread range
        • Which affects LAN and small interconnecting LAN is termed as low threat like, joshi,shankar macro viruses
        • Affecting a region or country is termed is medium threat for eg. Vbs.loveletter, W32.bugbear
        • Global widespread is termed as High Threat for eg. Mellisa, NIMDA, KLEZ, MYDOOM
    • Lets Know More about them !!
    • Computer hoaxes
      • Are message alerts warning users about new unknown viruses or Trojan programs. These messages "inform" that there is a new type of virus spreading through the Internet channels and/or e-mail and destroying information on affected computers.
      • These messages are deliberately false and started by people with malicious intentions. The duped users then pass these messages to other people thinking they are helping them to protect themselves against a new danger. Usually, the text of these fake "new virus" messages is written in panicky script and may appear as an example of the following:
      • WARNING!!! If you receive an e-mail titled "JOIN THE CREW" DO NOT open it! It will erase EVERYTHING on your hard drive! Send this letter out to as many people you can....this is a new virus and not many people know about it! There are other variants of such messages reporting about viruses in non-executable data files (graphic and sound files), in the CMOS and BIOS, etc.
    • Computer Hoaxes
      • Always see the latest hoaxes list from these websites
      • http://www.datafellows.com/news/hoax/
      • http://kumite.com/myths/
    • File Viruses
      • The possibility of incorporating a file virus into virtually any executable of virtually any popular OS does exist. As of today, there are known viruses infecting all kinds of executables of standard DOS: batch command files (BAT), loadable drivers (SYS, including special purpose files IO.SYS and MS- DOS.SYS) and binary executables (EXE, COM). There also exist viruses targeting executables of other operating systems - Windows 3.x, Windows95/NT, OS/2, Macintosh, Unix, including the VxD drivers of Windows 3.x and Windows95.
      • Die_Hard, Wrzod
    • Macro Viruses
      • 1. Access Macro Viruses - new generation of infectors
      • 2. AmiPro Macro Viruses
      • 3. Excel Macro Viruses
      • 4. Excel4 Macro Viruses
      • 5. Excel97 Macro Viruses
      • 6. Excel97/Word97 Macro Viruses
      • 7. PowerPoint Macro Viruses
      • 8. Visio Macro Viruses
      • 11. Word Macro Viruses
      • 12. Word2000 Macro Viruses
      • 13. Word97 Macro Viruses
    • Macro Viruses
      • The impossibility to convert the infected document in any other format.
      • The impossibility to save the document in any other subdirectory/disk by using the "Save As" command.
      • The infected documents have the Template internal format. During infection, the documents are converted by the viruses from Microsoft Document into Template format.
    • Trojans
      • They are generally called as backdoor programs, these are generally small scripts or codes, which are passed through internet or an email, once it infects the machines the program starts looking for open network ports and starts working as directed by the coder.
    • Trojan
      • What it steals
        • Your Keystrokes are recorded and mailed for entire login session, which includes your passwords and other personal information
        • Your data is on serious risk, as data can be deleted and copied or modified
        • And lot many other activities can be performed by the coder. Some common trojans are Back Orifice, Trojan.js.deltree.y
    • Worms
      • Most deadliest, unavoidable and widely spreading form of virus
    • Worms
      • How it spreads ?
        • Has it’s own SMTP engine.
        • Monitors all the email addresses of the infected machine.
        • Attaches itself to registry control for any antivirus and disables it.
    • How it affects ? Infected machine user : mac Email Id’s in Address book Like [email_address] + Internet Connectivity Worm Mail to [email_address] from : mac@other.com Mail to [email_address] from : [email_address] + data file attached
    • Human Error
      • We hear users saying
      • “ Oh I accidentally formatted my data partition.
      • Please help I have deleted my photographs and emptied them from recycle bin.
    • Case Study
      • Most of our international and ESD user(s) have been reporting the cause of the crash and most amazingly they were responsible for the cause of crash, we receive 100 – 300 mails for data loss per week and 60 –70 % are human error.
    • Sabotage
      • This can be done by a disgruntled employee
      • Competition
      • Hackers (For Fun)
    • Hacking Hacker Remote FTP Server Remote HTTP Server LAN ICQ, Yahoo, MSN Chat
    • Natural Disaster
      • Organizations prepare disaster management techniques to overcome such situations.
      • Decentralized form of Internet also helps to overcome such situation.