SlideShare a Scribd company logo
1 of 8
Download to read offline
COMPUTER
THREATS
Definition
As defined by the National Information Assurance Glossary
“Any circumstance or event with the potential to adversely impact an IS
through unauthorized access, destruction, disclosure, modification of
data and/or denial of service.”
A computer threat can be "intentional" such as hacking or "accidental"
such as malfunctioning of or physical damage.
Types of Threats
Following are the most common types of computer threats
 Physical damage
It includes fire, water, pollution, etc.
 Natural events
It includes climatic, earthquake, volcanic activity, etc.
 Loss of services
It includes electrical power, air conditioning, telecommunication, etc.
 Technical failures
It includes problems in equipment, software, capacity saturation, etc.
 Deliberate type
It includes spying, illegal processing of data, etc.
Some other threats include error in use, abuse of rights, denial of actions,
eavesdropping, theft of media, retrieval of discarded materials, etc.
Sources of Threats
The possible sources of a computer threat may be
 Internal
It includes employees, partners, contractors (and vendors).
 External
It includes cyber-criminals (professional hackers), spies, non-professional
hackers, activists, malware (virus/worm/etc.) etc.
Common Terms
Following are the common terms frequently used to define computer threat
 Virus Threats
A computer virus is a program designed to disrupt the normal functioning of
the computer without the permission of the user.
 Spyware Threats
Spyware is a computer program that monitors user’s online activities or
installs programs without user’s consent for profit or theft of personal information.
 Hackers
Hackers are programmers who put others on threats for their personal gain
by breaking into computer systems with the purpose to steal, change or destroy
information.
 Phishing Threats
It is an illegal activity through which phishers attempt to steal
sensitive financial or personal data by means of fraudulent email or instant
messages.
 Spam
Email spam is the electronic version of junk mail. It involves sending
unwanted messages, often unsolicited advertising, to a large number of recipients.
Spam is a serious security concern, as it can be used to deliver email that could
contain Trojan horses, viruses, worms, spyware and targeted attacks aimed at
obtaining sensitive, personal identification information.
How to Secure Your Computer System from
Threats?
Following are the significant tips through which you can protect your system from
different types of threat
 Install, use and keep updated Anti-Virus in your system.
 Install, use and keep updated a Firewall Program.
 Always take backups of your important Files and Folders.
 Use Strong and Typical Passwords.
 Take precaution especially when Downloading and Installing Programs.
 Install, use and keep updated a File Encryption Program.
 Take precaution especially when Reading Email with Attachments.
 Keep your Children aware of Internet threats and safe browsing.
Questions?

More Related Content

Similar to Computer Threat.pdf

“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Cybersecurity
CybersecurityCybersecurity
CybersecuritySabiha M
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Jevaughan Edie
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptvisik2
 
Cyber security
Cyber securityCyber security
Cyber securityAkdu095
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 

Similar to Computer Threat.pdf (20)

“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Security issues ethics in education chapter 8
Security issues ethics in education chapter 8Security issues ethics in education chapter 8
Security issues ethics in education chapter 8
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer security
Computer securityComputer security
Computer security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)
 
Computer security
Computer securityComputer security
Computer security
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
9080
90809080
9080
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cyber Security Briefing
Cyber Security BriefingCyber Security Briefing
Cyber Security Briefing
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Computer Threat.pdf

  • 2. Definition As defined by the National Information Assurance Glossary “Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data and/or denial of service.” A computer threat can be "intentional" such as hacking or "accidental" such as malfunctioning of or physical damage.
  • 3. Types of Threats Following are the most common types of computer threats  Physical damage It includes fire, water, pollution, etc.  Natural events It includes climatic, earthquake, volcanic activity, etc.  Loss of services It includes electrical power, air conditioning, telecommunication, etc.  Technical failures It includes problems in equipment, software, capacity saturation, etc.  Deliberate type It includes spying, illegal processing of data, etc. Some other threats include error in use, abuse of rights, denial of actions, eavesdropping, theft of media, retrieval of discarded materials, etc.
  • 4. Sources of Threats The possible sources of a computer threat may be  Internal It includes employees, partners, contractors (and vendors).  External It includes cyber-criminals (professional hackers), spies, non-professional hackers, activists, malware (virus/worm/etc.) etc.
  • 5. Common Terms Following are the common terms frequently used to define computer threat  Virus Threats A computer virus is a program designed to disrupt the normal functioning of the computer without the permission of the user.  Spyware Threats Spyware is a computer program that monitors user’s online activities or installs programs without user’s consent for profit or theft of personal information.  Hackers Hackers are programmers who put others on threats for their personal gain by breaking into computer systems with the purpose to steal, change or destroy information.
  • 6.  Phishing Threats It is an illegal activity through which phishers attempt to steal sensitive financial or personal data by means of fraudulent email or instant messages.  Spam Email spam is the electronic version of junk mail. It involves sending unwanted messages, often unsolicited advertising, to a large number of recipients. Spam is a serious security concern, as it can be used to deliver email that could contain Trojan horses, viruses, worms, spyware and targeted attacks aimed at obtaining sensitive, personal identification information.
  • 7. How to Secure Your Computer System from Threats? Following are the significant tips through which you can protect your system from different types of threat  Install, use and keep updated Anti-Virus in your system.  Install, use and keep updated a Firewall Program.  Always take backups of your important Files and Folders.  Use Strong and Typical Passwords.  Take precaution especially when Downloading and Installing Programs.  Install, use and keep updated a File Encryption Program.  Take precaution especially when Reading Email with Attachments.  Keep your Children aware of Internet threats and safe browsing.