SlideShare a Scribd company logo
1 of 29
1
Computer security Against
threats
A presentation by Vishwaraj Yadav
and Saurav Mohapatra of class 11th
Cannas
2
Contents
• Security of computer
• Threats to computer security
• Solutions to computer threats
Security of system
• Nowadays, Computers are used
everywhere. Various data is shared
from one computer to another. But
sometimes the data is not
trustworthy, or it behaves in an
undesired manner. If this happens then
our computer is insecure.
3
Continued….
• So to make our computer secured we
need Computer security.
• It is the ability of computer to protect
information & system resources with
respect to confidentiality & integrity.
4
• A threat is a potential violation to
security. When it is executed it becomes
attack.
5
Threats to computer
security
6
Threats to computer
security
PC
Intrusion
Spyware Adware Spamming Viruses
Worms
Trojans
Phishing
7
Computer Virus
• Viruses are malicious codes that cause
damage to data, they can attack to any
part of computer’s software such as boot
block, files & application programs etc.
• Worms & Trojan horses are similar
programs having virus-like effects.
Computer Virus
• Worms- A self-replicating program
which eats up the entire disk space or
memory.
• Trojan Horses- It is a program which
appears harmless but performs
malicious functions such as deleting or
damaging files.
8
Computer Virus
• How do viruses damage computer?
1. They damage or delete files.
2. Slow down the computer.
3. Invade your email program.
9
10
Computer
Viruses
Boot sector
viruses
File
viruses
Macro
viruses
Multipartite
viruses
Polymorph
ic viruses
11
Computer Virus
Types of Computer Virus
• Boot Sector Virus
Boot sector viruses infect the boot sectors on floppy
disks and hard disks, and can also infect the master
boot record on a user's hard drive.
• File Virus
Operate in memory and usually infect executable files.
• Polymorphic virus
They mutate their own code to make it difficult for
antivirus to detect and remove.
Computer Virus
• Multi-partite Virus
Multi-partite viruses have characteristics
of both boot sector viruses and file
infector viruses.
• Macro Virus
They infect macro utilities that accompany
such applications as Microsoft
Word, Excel and outlook.
12
13
Example of computer virus
I LOVE YOU
• VBS/LoveLetter is a VBScript worm. It
spreads through e-mail as a chain letter.
• This worm sends itself to email addresses in
the Microsoft Outlook address book and also
spreads to Internet chatrooms.
• This worm overwrites files on local and
remote drives, including files with the
extensions .html, .c,.bat,.mp3 etc.
spyware
• Spyware is a software which is installed
in the computer to spy on the activities
done on the computer.
• It tracks what all user does and reports
it to the central source. They are used
to spy either for legal purpose or illegal
purpose.
14
Spyware
15
spyware
• How do spyware cause damage?
1. They monitor information such as what
sites you visit or record keystrokes
which can lead to identity thefts.
2. Some spywares alter PC settings like
position of your desktop icons etc.
3. It can rob the PC of system speed and
internet access efficiency.
16
Adware
• These are programs that deliver
unwanted ads to computer(in the form
of pop-ups).
17
Adware
• How do adware damage computer?
1. Adware tracks the information just like
spyware.
2. When adware infects the computer, we
will receive frequent pop-ups
appearing out of nowhere.
3. The appearing of large number of ads
,the PC starts to slow down.
18
Spamming
• Spamming refers to sending of bulk-
mail by an identified or unidentified
source. The attacker keeps on sending
bulk mail to various accounts until mail
server runs out of disk space.
19
Spamming
• How do spams damage computer?
1. Spam messages circulating across
internet disrupt email delivery & system
performance.
2. Spams eats up time.
3. Spam messages contain fraud material
and can even spread viruses.
20
PC Intrusion
• Every PC connected to Internet are
target of hackers. Hackers constantly
attack computers.
21
PC Intrusion
• How can it damage the system?
1. Sweeper attack- Hackers use it to
delete all the data in the system.
2. Denial of service- Thais attack eats up
all the resources of system and system
or application doesn’t work.
3. Password guessing- Hackers crack or
guess passwords of account to gain
entry into remote computer systems.
22
Solutions to computer
threats
• The computer security protects the
computer through threats by taking
actions or taking prevention. There are
two solutions to these threats-
1. Active Protection
2. Preventive Maesures
23
Continued…
• Active Protection- Installing and using
antivirus that includes Internet security-
which includes protection against
viruses, spyware & PC intrusion.
• Preventive measures- Even though
security programs detect & eliminate
threats but we should help prevent
these issues from ever arising.
24
Continued…
• Solutions to viruses, adware,spyware
1. Active protection
• Use Anti-virus and Anti-spyware
software.
• Download updates regularly.
• Run frequent full-system scans.
25
2. Preventive measures
• Keep your system up-to-date.
• Use caution when downloading files on
the internet.
• Be careful with email.
• Disable Cookies, if possible.
26
Continued…
• Solutions to Spam
1. Active Protection:-Methods used by
anti-spam software-
(a)Sender Filtering
Digital Certificates
Digital Signatures
(b)Keyword Filtering
27
Continued…
Solutions to PC intrusion:-
Authorization
Authentication
Firewall
28
Continued…
29

More Related Content

What's hot (20)

Viruses notes
Viruses notesViruses notes
Viruses notes
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Attack types
Attack typesAttack types
Attack types
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Windows network security
Windows network securityWindows network security
Windows network security
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
System security
System securitySystem security
System security
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Security Requirements in eBusiness
Security Requirements in eBusinessSecurity Requirements in eBusiness
Security Requirements in eBusiness
 

Similar to Saurav vishwaraj pro

Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Rahman_Hussain
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber securityBansari Shah
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3gpioa
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 

Similar to Saurav vishwaraj pro (20)

Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Malicious
MaliciousMalicious
Malicious
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
computer security
computer securitycomputer security
computer security
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Saurav vishwaraj pro

  • 1. 1 Computer security Against threats A presentation by Vishwaraj Yadav and Saurav Mohapatra of class 11th Cannas
  • 2. 2 Contents • Security of computer • Threats to computer security • Solutions to computer threats
  • 3. Security of system • Nowadays, Computers are used everywhere. Various data is shared from one computer to another. But sometimes the data is not trustworthy, or it behaves in an undesired manner. If this happens then our computer is insecure. 3
  • 4. Continued…. • So to make our computer secured we need Computer security. • It is the ability of computer to protect information & system resources with respect to confidentiality & integrity. 4
  • 5. • A threat is a potential violation to security. When it is executed it becomes attack. 5 Threats to computer security
  • 6. 6 Threats to computer security PC Intrusion Spyware Adware Spamming Viruses Worms Trojans Phishing
  • 7. 7 Computer Virus • Viruses are malicious codes that cause damage to data, they can attack to any part of computer’s software such as boot block, files & application programs etc. • Worms & Trojan horses are similar programs having virus-like effects.
  • 8. Computer Virus • Worms- A self-replicating program which eats up the entire disk space or memory. • Trojan Horses- It is a program which appears harmless but performs malicious functions such as deleting or damaging files. 8
  • 9. Computer Virus • How do viruses damage computer? 1. They damage or delete files. 2. Slow down the computer. 3. Invade your email program. 9
  • 11. 11 Computer Virus Types of Computer Virus • Boot Sector Virus Boot sector viruses infect the boot sectors on floppy disks and hard disks, and can also infect the master boot record on a user's hard drive. • File Virus Operate in memory and usually infect executable files. • Polymorphic virus They mutate their own code to make it difficult for antivirus to detect and remove.
  • 12. Computer Virus • Multi-partite Virus Multi-partite viruses have characteristics of both boot sector viruses and file infector viruses. • Macro Virus They infect macro utilities that accompany such applications as Microsoft Word, Excel and outlook. 12
  • 13. 13 Example of computer virus I LOVE YOU • VBS/LoveLetter is a VBScript worm. It spreads through e-mail as a chain letter. • This worm sends itself to email addresses in the Microsoft Outlook address book and also spreads to Internet chatrooms. • This worm overwrites files on local and remote drives, including files with the extensions .html, .c,.bat,.mp3 etc.
  • 14. spyware • Spyware is a software which is installed in the computer to spy on the activities done on the computer. • It tracks what all user does and reports it to the central source. They are used to spy either for legal purpose or illegal purpose. 14
  • 16. spyware • How do spyware cause damage? 1. They monitor information such as what sites you visit or record keystrokes which can lead to identity thefts. 2. Some spywares alter PC settings like position of your desktop icons etc. 3. It can rob the PC of system speed and internet access efficiency. 16
  • 17. Adware • These are programs that deliver unwanted ads to computer(in the form of pop-ups). 17
  • 18. Adware • How do adware damage computer? 1. Adware tracks the information just like spyware. 2. When adware infects the computer, we will receive frequent pop-ups appearing out of nowhere. 3. The appearing of large number of ads ,the PC starts to slow down. 18
  • 19. Spamming • Spamming refers to sending of bulk- mail by an identified or unidentified source. The attacker keeps on sending bulk mail to various accounts until mail server runs out of disk space. 19
  • 20. Spamming • How do spams damage computer? 1. Spam messages circulating across internet disrupt email delivery & system performance. 2. Spams eats up time. 3. Spam messages contain fraud material and can even spread viruses. 20
  • 21. PC Intrusion • Every PC connected to Internet are target of hackers. Hackers constantly attack computers. 21
  • 22. PC Intrusion • How can it damage the system? 1. Sweeper attack- Hackers use it to delete all the data in the system. 2. Denial of service- Thais attack eats up all the resources of system and system or application doesn’t work. 3. Password guessing- Hackers crack or guess passwords of account to gain entry into remote computer systems. 22
  • 23. Solutions to computer threats • The computer security protects the computer through threats by taking actions or taking prevention. There are two solutions to these threats- 1. Active Protection 2. Preventive Maesures 23
  • 24. Continued… • Active Protection- Installing and using antivirus that includes Internet security- which includes protection against viruses, spyware & PC intrusion. • Preventive measures- Even though security programs detect & eliminate threats but we should help prevent these issues from ever arising. 24
  • 25. Continued… • Solutions to viruses, adware,spyware 1. Active protection • Use Anti-virus and Anti-spyware software. • Download updates regularly. • Run frequent full-system scans. 25
  • 26. 2. Preventive measures • Keep your system up-to-date. • Use caution when downloading files on the internet. • Be careful with email. • Disable Cookies, if possible. 26 Continued…
  • 27. • Solutions to Spam 1. Active Protection:-Methods used by anti-spam software- (a)Sender Filtering Digital Certificates Digital Signatures (b)Keyword Filtering 27 Continued…
  • 28. Solutions to PC intrusion:- Authorization Authentication Firewall 28 Continued…
  • 29. 29