In this ppt, you'll learn about the security threats that you should be aware of to take essential security measures to ensure integrity, confidentiality, and availability of the information.
2. Advancement in cloud technology and
usage of internet often comes with security risk
associate with it.
So here is the list of top security
threats that you must be aware of so that you
can take essential security measures to
ensure integrity, confidentiality, and
availability of the information.
Security threats are classified into three
categories:
- Environmental
- Technological
- Human-factor
3. ENVIRONMENTAL
These threats are non-
malicious but can be caused
by natural phenomena such as
fire, flood, earthquakes,
hurricanes, and other natural
disasters.
4. TECHNOLOGICAL
These threats are caused due
to hardware failure, outdated
software and hardware, or
other reasons like power
failure.
5. HUMAN-FACTOR
Malicious or non-malicious
human agents cause these
threats. Some of these
threats are result of errors,
corruption or misuse of
information. These threats
are also known as cyber
attacks.
7. This attack is carried out by unwanted
applications that are installed on the
end user's system. Some of the
prevalent malware attacks are worms,
virus, ransomware, trojan horse,
spyware, rootkit etc.
Also know as DDoS, in this attack
multiple compromised computer
attack the target server, website, or
network resource, which causes a
denial of service.
DISTRIBUTED DENIAL OF
SERVICE
This attack is carried out by the
fraudulent mail which tricks the victim
that the message is from the company or
individual they wanted to hear back like
request from the bank or note from the
company. It is in the form of a
attachment or link to a malicious
site.
PHISHING ATTACK
MALWARE ATTACK
8. MAN IN THE MIDDLE
ATTACK
This malware hides on your device
and eat up the computer resource to
mine cryptocurrencies like bitcoins.
Cybercriminal uses two approaches
to decode the password:
a) Brute Force: Trying out common
words, number related to persons'
info.
b) Dictionary Attack: Trying out
commonly used passwords like
123467, passwords, etc.
PASSWORD ATTACK In this attack, the attacker relays
and alter the communication
between two parties. The hacker
tricks the system into believing that
he is an authorized user.
CRYPTOJACKING ATTACK
9. Want to know more? Download the
complete E-Book for free!
9 Security Threats You Should Be
Aware Of
10. To know more visit
or call our Solutions Consultant at
1-855-ACE-IT-UP
www.acecloudhosting.com
About Us
Ace Cloud Hosting is a managed cloud
hosting provider and specializes in providing
cloud solutions for accounting, tax, retail,
and construction industries.
We host accounting applications on super-
fast and secure servers which are protected
by methods such as multi-factor
authentication, IDS/IPS, firewalls and
antivirus/anti-malware.
host accounting applications
11. Liked This Deck?
Check out some of the other slides on SlideShare.....
Follow us for more great content