3. Introduction :
Internet has revolutionized the world and people are
getting used to having access to whatever
information they want anytime , anywhere.
Unfortunately, this also has resulted in increased
security concerns.
4. Threats to Computer Security :
• A Threat is a potential violation of security.When a
threat is actually executed,it becomes attack.Those
who executes such actions,or cause them to be
executed are called attackers.
• They are also known as malware that harms your
computer.
5. Computer Viruses :
• A computer virus is a type of computer program that, when
executed, replicates itself by modifying other computer
programs and inserting its own code. If this replication
succeeds, the affected areas are then said to be "infected"
with a computer virus, a metaphor derived from biological
viruses.
• Examples of Computer Virus
1. Morris Worm.
2. Nimda.
3. ILOVEYOU.
4. SQL Slammer.
5. Stuxnet.
6. CryptoLocker.
7. Conficker.
8. Tinba.
6. Spyware :
• Spyware is software with malicious behaviour that
aims to gather information about a person or
organization and send it to another entity in a way
that harms the user—for example, by violating
their privacy or endangering their device's security.
• If an unauthorized person wants to see you through
your phone's camera, using a spyware app is a
viable method. Fortunately, if your stalker isn't a
sophisticated hacker, the software they use may
appear as an open application running behind the
scenes.
7. Adware :
• Adware is a form of malware that hides on your
device and serves you advertisements. Some
adware also monitors your behavior online so it can
target you with specific ads.
8. Spamming :
• Spamming is the use of messaging systems to send
multiple unsolicited messages (spam) to large
numbers of recipients for the purpose of
commercial advertising, for the purpose of non-
commercial proselytizing, for any prohibited
purpose (especially the fraudulent purpose of
phishing), or simply repeatedly sending the same
message to the same user.
9. PC Intrusion :
• Computer intrusions occur when someone tries to
gain access to any part of your computer system.
Computer intruders or hackers typically use
automated computer programs when they try to
compromise a computer's security.
10. Eavesdropping :
• An eavesdropping attack, also known as a sniffing
or snooping attack, is a theft of information as it is
transmitted over a network by a computer,
smartphone, or another connected device. The
attack takes advantage of unsecured network
communications to access data as it is being sent or
received by its user.
11. Phishing and Pharming :
• In phishing, the attacker tries to find the sensitive
information of users by the means of electronic
communication illegally. Pharming is a more
advanced technique to get users' credentials by
making effort to enter users into the website. It is
an attempt to scam people one at a time via an
email or instant message.