SlideShare a Scribd company logo
1 of 2
Download to read offline
1)The viruse which is the most dangerous threat.In DTI survey,72% of all the companies
received infected e-mails last year.the internet experienceed three worms in 12 day which causes
1.8bn damages,according to Symantec's internet Security Threat Report.
2)Social network attacks which are cyber security threat due to social networks like
facebook,twitter.We can access them by even phone.
While subscribing to these we provide some information regarding us like phone number to the
web thus the hackers can easily get our
information through internet.They use one Technic called "Intelligence Information gathering"
which is more advance than google.They can
see our posts also so try to avoid posting sensitive and personal information.
3)By gathering the Celebrity information the hackers sent
malware(.pif,.scr,.exe,.com,.vbs,.bat,.cmd or .hta have extenstion ) to their targets.
When the user run that program,hackers trigger a Throjan horse or Remote Administration
Tool(RAT) by this hackers can remotely acces users machine.
SSL protocal is used for internet banking.By using Man-in-middle software which employs the
ARP posioning technique to can sniff the password.
So be alert while using ATM,Credit card and check the statements carefully.
4)Insider threats or organised crime more than 50 percent cyber security threats are caused by
internal figures means computer crime may be carried
out by one person by hacking prepaid phone card system.That is "Organised crime"
china,Brazil,Russia cooperating with internal employees in criminal
model CaaS.
5)These internal attacks are most dangerous threat to data and systems.Rogue employees,who are
members of the IT team with knowledge of and access to
networks,data centers and admin accounts, can cause serious damage.
6)Misunderstanding GRC:So many managements dont't understand the concept of
GRC(Governance,Risk Management,Compliance) for IT governance,information
security governance and corporate governance.To deal with training in IT governance,corporate
governance,information security governance are best practice.
ITIL and CobiT helps to deal with this problem.
Solution
1)The viruse which is the most dangerous threat.In DTI survey,72% of all the companies
received infected e-mails last year.the internet experienceed three worms in 12 day which causes
1.8bn damages,according to Symantec's internet Security Threat Report.
2)Social network attacks which are cyber security threat due to social networks like
facebook,twitter.We can access them by even phone.
While subscribing to these we provide some information regarding us like phone number to the
web thus the hackers can easily get our
information through internet.They use one Technic called "Intelligence Information gathering"
which is more advance than google.They can
see our posts also so try to avoid posting sensitive and personal information.
3)By gathering the Celebrity information the hackers sent
malware(.pif,.scr,.exe,.com,.vbs,.bat,.cmd or .hta have extenstion ) to their targets.
When the user run that program,hackers trigger a Throjan horse or Remote Administration
Tool(RAT) by this hackers can remotely acces users machine.
SSL protocal is used for internet banking.By using Man-in-middle software which employs the
ARP posioning technique to can sniff the password.
So be alert while using ATM,Credit card and check the statements carefully.
4)Insider threats or organised crime more than 50 percent cyber security threats are caused by
internal figures means computer crime may be carried
out by one person by hacking prepaid phone card system.That is "Organised crime"
china,Brazil,Russia cooperating with internal employees in criminal
model CaaS.
5)These internal attacks are most dangerous threat to data and systems.Rogue employees,who are
members of the IT team with knowledge of and access to
networks,data centers and admin accounts, can cause serious damage.
6)Misunderstanding GRC:So many managements dont't understand the concept of
GRC(Governance,Risk Management,Compliance) for IT governance,information
security governance and corporate governance.To deal with training in IT governance,corporate
governance,information security governance are best practice.
ITIL and CobiT helps to deal with this problem.

More Related Content

Similar to 1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf

A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet IJECEIAES
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docxModule 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docxaudeleypearl
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxInfosectrain3
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet securityRahul Sah
 

Similar to 1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf (20)

A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Information security
Information securityInformation security
Information security
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docxModule 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet security
 

More from anjanaarts2014

A robust whistleblowing regime is now an integral part of governance.pdf
A robust whistleblowing regime is now an integral part of governance.pdfA robust whistleblowing regime is now an integral part of governance.pdf
A robust whistleblowing regime is now an integral part of governance.pdfanjanaarts2014
 
1. In higher parts of the reef, where the wave energy is high, the c.pdf
1. In higher parts of the reef, where the wave energy is high, the c.pdf1. In higher parts of the reef, where the wave energy is high, the c.pdf
1. In higher parts of the reef, where the wave energy is high, the c.pdfanjanaarts2014
 
a)dydx + 2yx = xI.F. = x^2solution iy .pdf
a)dydx + 2yx = xI.F. = x^2solution iy .pdfa)dydx + 2yx = xI.F. = x^2solution iy .pdf
a)dydx + 2yx = xI.F. = x^2solution iy .pdfanjanaarts2014
 
23.C. 1 in 424. B. Homozygous25. B. 5026.All females will be .pdf
23.C. 1 in 424. B. Homozygous25. B. 5026.All females will be .pdf23.C. 1 in 424. B. Homozygous25. B. 5026.All females will be .pdf
23.C. 1 in 424. B. Homozygous25. B. 5026.All females will be .pdfanjanaarts2014
 
A is correct. The ntp server 10.0.0.5 command is entered in Global C.pdf
A is correct. The ntp server 10.0.0.5 command is entered in Global C.pdfA is correct. The ntp server 10.0.0.5 command is entered in Global C.pdf
A is correct. The ntp server 10.0.0.5 command is entered in Global C.pdfanjanaarts2014
 
A. Gene expression.B. Transcription factor.C. Gene expression..pdf
A. Gene expression.B. Transcription factor.C. Gene expression..pdfA. Gene expression.B. Transcription factor.C. Gene expression..pdf
A. Gene expression.B. Transcription factor.C. Gene expression..pdfanjanaarts2014
 
All are capable to grow in lactose medium . In presence of lactose t.pdf
All are capable to grow in lactose medium . In presence of lactose t.pdfAll are capable to grow in lactose medium . In presence of lactose t.pdf
All are capable to grow in lactose medium . In presence of lactose t.pdfanjanaarts2014
 
HClO3 + NaOH NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf
                     HClO3 + NaOH  NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf                     HClO3 + NaOH  NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf
HClO3 + NaOH NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdfanjanaarts2014
 
I have already answered it. Check. .pdf
                     I have already answered it. Check.               .pdf                     I have already answered it. Check.               .pdf
I have already answered it. Check. .pdfanjanaarts2014
 
Iodide is a strong nucleophile but a weak base, s.pdf
                     Iodide is a strong nucleophile but a weak base, s.pdf                     Iodide is a strong nucleophile but a weak base, s.pdf
Iodide is a strong nucleophile but a weak base, s.pdfanjanaarts2014
 
NaCl Its the coulombic interaction between Na.pdf
                     NaCl  Its the coulombic interaction between Na.pdf                     NaCl  Its the coulombic interaction between Na.pdf
NaCl Its the coulombic interaction between Na.pdfanjanaarts2014
 
Here Jupiter is the fifth planet from the Sun a.pdf
                     Here  Jupiter is the fifth planet from the Sun a.pdf                     Here  Jupiter is the fifth planet from the Sun a.pdf
Here Jupiter is the fifth planet from the Sun a.pdfanjanaarts2014
 
moles of H+ = 42.0 x 0.120 millimoles = 5.04 mill.pdf
                     moles of H+ = 42.0 x 0.120 millimoles = 5.04 mill.pdf                     moles of H+ = 42.0 x 0.120 millimoles = 5.04 mill.pdf
moles of H+ = 42.0 x 0.120 millimoles = 5.04 mill.pdfanjanaarts2014
 
Lithium is group 1 metal, while nitrogen is group.pdf
                     Lithium is group 1 metal, while nitrogen is group.pdf                     Lithium is group 1 metal, while nitrogen is group.pdf
Lithium is group 1 metal, while nitrogen is group.pdfanjanaarts2014
 
there is some special character in ur question li.pdf
                     there is some special character in ur question li.pdf                     there is some special character in ur question li.pdf
there is some special character in ur question li.pdfanjanaarts2014
 
a.Times Interest Earned Ratio = EBIT interest ExpenseFor 2014.pdf
a.Times Interest Earned Ratio = EBIT  interest ExpenseFor 2014.pdfa.Times Interest Earned Ratio = EBIT  interest ExpenseFor 2014.pdf
a.Times Interest Earned Ratio = EBIT interest ExpenseFor 2014.pdfanjanaarts2014
 
45 yrs.Solution45 yrs..pdf
45 yrs.Solution45 yrs..pdf45 yrs.Solution45 yrs..pdf
45 yrs.Solution45 yrs..pdfanjanaarts2014
 
the bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdf
the bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdfthe bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdf
the bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdfanjanaarts2014
 
ANSWER A for example fluoride, oxide.... etc. .pdf
                     ANSWER A for example fluoride, oxide.... etc.  .pdf                     ANSWER A for example fluoride, oxide.... etc.  .pdf
ANSWER A for example fluoride, oxide.... etc. .pdfanjanaarts2014
 

More from anjanaarts2014 (20)

A robust whistleblowing regime is now an integral part of governance.pdf
A robust whistleblowing regime is now an integral part of governance.pdfA robust whistleblowing regime is now an integral part of governance.pdf
A robust whistleblowing regime is now an integral part of governance.pdf
 
1. In higher parts of the reef, where the wave energy is high, the c.pdf
1. In higher parts of the reef, where the wave energy is high, the c.pdf1. In higher parts of the reef, where the wave energy is high, the c.pdf
1. In higher parts of the reef, where the wave energy is high, the c.pdf
 
a)dydx + 2yx = xI.F. = x^2solution iy .pdf
a)dydx + 2yx = xI.F. = x^2solution iy .pdfa)dydx + 2yx = xI.F. = x^2solution iy .pdf
a)dydx + 2yx = xI.F. = x^2solution iy .pdf
 
23.C. 1 in 424. B. Homozygous25. B. 5026.All females will be .pdf
23.C. 1 in 424. B. Homozygous25. B. 5026.All females will be .pdf23.C. 1 in 424. B. Homozygous25. B. 5026.All females will be .pdf
23.C. 1 in 424. B. Homozygous25. B. 5026.All females will be .pdf
 
A is correct. The ntp server 10.0.0.5 command is entered in Global C.pdf
A is correct. The ntp server 10.0.0.5 command is entered in Global C.pdfA is correct. The ntp server 10.0.0.5 command is entered in Global C.pdf
A is correct. The ntp server 10.0.0.5 command is entered in Global C.pdf
 
A. Gene expression.B. Transcription factor.C. Gene expression..pdf
A. Gene expression.B. Transcription factor.C. Gene expression..pdfA. Gene expression.B. Transcription factor.C. Gene expression..pdf
A. Gene expression.B. Transcription factor.C. Gene expression..pdf
 
All are capable to grow in lactose medium . In presence of lactose t.pdf
All are capable to grow in lactose medium . In presence of lactose t.pdfAll are capable to grow in lactose medium . In presence of lactose t.pdf
All are capable to grow in lactose medium . In presence of lactose t.pdf
 
HClO3 + NaOH NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf
                     HClO3 + NaOH  NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf                     HClO3 + NaOH  NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf
HClO3 + NaOH NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf
 
The -OCl ion. .pdf
                     The -OCl ion.                                    .pdf                     The -OCl ion.                                    .pdf
The -OCl ion. .pdf
 
I have already answered it. Check. .pdf
                     I have already answered it. Check.               .pdf                     I have already answered it. Check.               .pdf
I have already answered it. Check. .pdf
 
Iodide is a strong nucleophile but a weak base, s.pdf
                     Iodide is a strong nucleophile but a weak base, s.pdf                     Iodide is a strong nucleophile but a weak base, s.pdf
Iodide is a strong nucleophile but a weak base, s.pdf
 
NaCl Its the coulombic interaction between Na.pdf
                     NaCl  Its the coulombic interaction between Na.pdf                     NaCl  Its the coulombic interaction between Na.pdf
NaCl Its the coulombic interaction between Na.pdf
 
Here Jupiter is the fifth planet from the Sun a.pdf
                     Here  Jupiter is the fifth planet from the Sun a.pdf                     Here  Jupiter is the fifth planet from the Sun a.pdf
Here Jupiter is the fifth planet from the Sun a.pdf
 
moles of H+ = 42.0 x 0.120 millimoles = 5.04 mill.pdf
                     moles of H+ = 42.0 x 0.120 millimoles = 5.04 mill.pdf                     moles of H+ = 42.0 x 0.120 millimoles = 5.04 mill.pdf
moles of H+ = 42.0 x 0.120 millimoles = 5.04 mill.pdf
 
Lithium is group 1 metal, while nitrogen is group.pdf
                     Lithium is group 1 metal, while nitrogen is group.pdf                     Lithium is group 1 metal, while nitrogen is group.pdf
Lithium is group 1 metal, while nitrogen is group.pdf
 
there is some special character in ur question li.pdf
                     there is some special character in ur question li.pdf                     there is some special character in ur question li.pdf
there is some special character in ur question li.pdf
 
a.Times Interest Earned Ratio = EBIT interest ExpenseFor 2014.pdf
a.Times Interest Earned Ratio = EBIT  interest ExpenseFor 2014.pdfa.Times Interest Earned Ratio = EBIT  interest ExpenseFor 2014.pdf
a.Times Interest Earned Ratio = EBIT interest ExpenseFor 2014.pdf
 
45 yrs.Solution45 yrs..pdf
45 yrs.Solution45 yrs..pdf45 yrs.Solution45 yrs..pdf
45 yrs.Solution45 yrs..pdf
 
the bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdf
the bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdfthe bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdf
the bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdf
 
ANSWER A for example fluoride, oxide.... etc. .pdf
                     ANSWER A for example fluoride, oxide.... etc.  .pdf                     ANSWER A for example fluoride, oxide.... etc.  .pdf
ANSWER A for example fluoride, oxide.... etc. .pdf
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf

  • 1. 1)The viruse which is the most dangerous threat.In DTI survey,72% of all the companies received infected e-mails last year.the internet experienceed three worms in 12 day which causes 1.8bn damages,according to Symantec's internet Security Threat Report. 2)Social network attacks which are cyber security threat due to social networks like facebook,twitter.We can access them by even phone. While subscribing to these we provide some information regarding us like phone number to the web thus the hackers can easily get our information through internet.They use one Technic called "Intelligence Information gathering" which is more advance than google.They can see our posts also so try to avoid posting sensitive and personal information. 3)By gathering the Celebrity information the hackers sent malware(.pif,.scr,.exe,.com,.vbs,.bat,.cmd or .hta have extenstion ) to their targets. When the user run that program,hackers trigger a Throjan horse or Remote Administration Tool(RAT) by this hackers can remotely acces users machine. SSL protocal is used for internet banking.By using Man-in-middle software which employs the ARP posioning technique to can sniff the password. So be alert while using ATM,Credit card and check the statements carefully. 4)Insider threats or organised crime more than 50 percent cyber security threats are caused by internal figures means computer crime may be carried out by one person by hacking prepaid phone card system.That is "Organised crime" china,Brazil,Russia cooperating with internal employees in criminal model CaaS. 5)These internal attacks are most dangerous threat to data and systems.Rogue employees,who are members of the IT team with knowledge of and access to networks,data centers and admin accounts, can cause serious damage. 6)Misunderstanding GRC:So many managements dont't understand the concept of GRC(Governance,Risk Management,Compliance) for IT governance,information security governance and corporate governance.To deal with training in IT governance,corporate governance,information security governance are best practice. ITIL and CobiT helps to deal with this problem. Solution 1)The viruse which is the most dangerous threat.In DTI survey,72% of all the companies received infected e-mails last year.the internet experienceed three worms in 12 day which causes
  • 2. 1.8bn damages,according to Symantec's internet Security Threat Report. 2)Social network attacks which are cyber security threat due to social networks like facebook,twitter.We can access them by even phone. While subscribing to these we provide some information regarding us like phone number to the web thus the hackers can easily get our information through internet.They use one Technic called "Intelligence Information gathering" which is more advance than google.They can see our posts also so try to avoid posting sensitive and personal information. 3)By gathering the Celebrity information the hackers sent malware(.pif,.scr,.exe,.com,.vbs,.bat,.cmd or .hta have extenstion ) to their targets. When the user run that program,hackers trigger a Throjan horse or Remote Administration Tool(RAT) by this hackers can remotely acces users machine. SSL protocal is used for internet banking.By using Man-in-middle software which employs the ARP posioning technique to can sniff the password. So be alert while using ATM,Credit card and check the statements carefully. 4)Insider threats or organised crime more than 50 percent cyber security threats are caused by internal figures means computer crime may be carried out by one person by hacking prepaid phone card system.That is "Organised crime" china,Brazil,Russia cooperating with internal employees in criminal model CaaS. 5)These internal attacks are most dangerous threat to data and systems.Rogue employees,who are members of the IT team with knowledge of and access to networks,data centers and admin accounts, can cause serious damage. 6)Misunderstanding GRC:So many managements dont't understand the concept of GRC(Governance,Risk Management,Compliance) for IT governance,information security governance and corporate governance.To deal with training in IT governance,corporate governance,information security governance are best practice. ITIL and CobiT helps to deal with this problem.