SlideShare a Scribd company logo
 When we use computers it is important to prevent corruption and lost of

user
data and let user to continue his work without any disturb. For this we must
secure our data.
 So it is very important to implement good security mechanisms.
Unauthorized Action
• Hacking
• Cracking

Malicious software
Virus
Worm
Trojan Horse
Time Bomb
Logic Bomb
Unauthorized Access
Hacking

• Trying to access or accessing the network by breaching the security by an
unauthorized person is known as hacking.
• Cheating others account numbers, credit card numbers and misuse them.
• Cheating trade secrets, confusing network devices are done by hacking.
• The person who does this is called a hacker.
Cracking

•

Changing software content, Serial number, security methods etc.

•

This done by a programmer who is not licensed to do so is called
cracking
Malicious software

• Malware or Malicious software is software designed to damage a computer system
without the owner's concerns.

• Malicious software is a general term used by computer professionals to mean a
variety of annoying software or program codes.

• Malicious software includes Virus, Worm, Trojan, Adware, Root kit, Spyware and
many other unwanted software.
Computer Virus
• A computer virus is a program code that can copy itself and infect a

computer without the permission of the user.

• In order to replicate itself, a virus must be permitted to execute and write
to memory.
• For this reason, many viruses attach themselves to an executable files
that
may be part of legitimate programs. Some viruses change its own code by
itself.
• Viruses spread via network, floppy disk, CDs, USB drive.
Symptoms of a virus attack
•Changes file size.
•Change system date and time.
•Slow down the computer.
•Shut down computer unexpectedly.
•Take more time to boot computer.
Worm
• Worm is a self-replicating computer program.

• It uses a network to send copies of itself to other systems and it may do so withou
any user intervention.
• Unlike a virus, it does not need to attach itself to an existing program.
Trojan horse
• This is a program that disguises itself as program.
• Similar to a virus, these programs are hidden and cause an unwanted effect.
• They differ from viruses because they are normally not designed to replicate like
a virus.
•By showing that this is important software running in the computer the Trojan
horse opens a back door to the hacker.
• There after unauthorized person can get into the computer and do harmful to
the user data.
E.g.: By opening unknown e-mail attachments
Symptoms when Trojan horse affects the computer:

•Sending the user’s important details to others.
•Changing or deleting data of the computer.
•Uploading and downloading data in an unauthorized way.
•Spreading malware such as viruses.
•Shutting down the computer unexpectedly.
•Unauthorized Software installation.
Boot sector virus

• This is a virus which infects the boot sector of a hard disk or other disk drives.

• The boot sector is the portion that stores the boot program that has the code fo
loading the operating system file onto memory.
• Once the boot sector is infected with the virus, it may rewrite the boot sector
making it unbootable or scramble the File Allocation Table (FAT).
Symptoms when Boot Sector Virus affect the computer:
•Sudden error massages.
•Windows restart with a blue screen error message.
•Boot Failure.
•Fail to format a particular drive.
Stealth Virus

• These viruses may be one of the type mentioned, but are designed to defeat
antivirus scanning and other antiviral software detection method (firewall).
• Mode of infection is from fake antivirus and software promoting website.
• This virus helps the other viruses too.
Spyware
• Software that is installed into a computer without the user's knowledge.
• Transmits information about the user's computer, and user activities over the
Internet.
• Redirect to sites which spoil the culture and the computer.
Symptoms when Spy ware affects to your computer:

• Sending user’s important data to others.
• Unauthorized Software installation.
• Redirect Web browser to dangerous web sites.
• Change Computer settings.
• Using anti-spyware we can minimize the damages.
Time Bomb

• This is simply some code on a computer which does not immediately trigger.
• Instead, it is set to cause it's damage at some point in the future.
• Usually Time bombs are designed to take revenge towards a company or an
organization.
‍ E.g.: Sending messages such as “You are a great FOOL!!!!” on April first.
OR
“Am the vampire who suck ur blood” at 12 P.M
Logic bomb

• A logic bomb is a program which will execute a pre-programmed routine when a
designated condition is met.
• Logic bombs do not make copies of themselves.
• Logic bomb work as same as time bomb.
 The large scale of creating virus is for business.
 Taking revenge.
 Like to see others suffering.

Mentally Affected

 Hobby and fun.

For virus creators?
How would you feel if your important files are corrupted or deleted? Its
pretty bad, it cause redoing all of our work. Therefore, creating and
spreading viruses is an activity one must never indulge in. After all,
everyone’s work is as precious as our are.
Computer Security threat
Computer Security threat
Computer Security threat

More Related Content

What's hot

Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
PrajktaGN
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
Muhammad Talha Zaroon
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
ShouaQureshi
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 
Signs of a zombie computer!
Signs of a zombie computer!Signs of a zombie computer!
Signs of a zombie computer!
kanika sharma
 
Security concepts
Security conceptsSecurity concepts
Security concepts
artisriva
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer Security
Nicholas Davis
 
Ppt123
Ppt123Ppt123
Ppt123
Faiz Khan
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primerChapter 1 malware analysis primer
Chapter 1 malware analysis primer
ManjuA8
 
System tThreats
System tThreatsSystem tThreats
System tThreats
Sunipa Bera
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
FCA - Future Chartered Accountants
 
Firewall
FirewallFirewall
Firewall
sajeena81
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
CAS
 
Types of malware
Types of malwareTypes of malware
Types of malware
techexpert2345
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
arun alfie
 
Computer Security
Computer SecurityComputer Security
Computer Security
vishal purkuti
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
Rizwan Razman
 
Attack on computer
Attack on computerAttack on computer
Attack on computer
Rabail khan
 

What's hot (20)

Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Signs of a zombie computer!
Signs of a zombie computer!Signs of a zombie computer!
Signs of a zombie computer!
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer Security
 
Ppt123
Ppt123Ppt123
Ppt123
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primerChapter 1 malware analysis primer
Chapter 1 malware analysis primer
 
System tThreats
System tThreatsSystem tThreats
System tThreats
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Firewall
FirewallFirewall
Firewall
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Attack on computer
Attack on computerAttack on computer
Attack on computer
 

Viewers also liked

Ti 2
Ti 2Ti 2
Credit lab sample links
Credit lab sample linksCredit lab sample links
Credit lab sample links
Ivan Grudev
 
Un gran encuentro
Un gran encuentroUn gran encuentro
Un gran encuentro
estef-erazo
 
Tugas linda sri rahayu
Tugas linda sri rahayuTugas linda sri rahayu
Tugas linda sri rahayu
Linda Sri Rahayu
 
Effective presentations skills
Effective presentations skillsEffective presentations skills
Effective presentations skills
Louise Robinson
 
Web browsertico
Web browserticoWeb browsertico
Web browsertico
tico3195
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
Azri Abdin
 
Brugia pahangi & brugia beaveri
Brugia  pahangi  &  brugia  beaveriBrugia  pahangi  &  brugia  beaveri
Brugia pahangi & brugia beaveri
Sreejith T
 
Web browers
Web browersWeb browers
Web browers
Rishabh Shrivastava
 
Tugasan ind soalan 1 & 3 baru
Tugasan ind soalan 1 & 3 baruTugasan ind soalan 1 & 3 baru
Tugasan ind soalan 1 & 3 baru
smugilah
 
Depression and cognitive
Depression and cognitiveDepression and cognitive
Depression and cognitive
Mariska Roux
 
Clinically Discrete Swellings Of Thyroid Gland
Clinically  Discrete Swellings Of Thyroid GlandClinically  Discrete Swellings Of Thyroid Gland
Clinically Discrete Swellings Of Thyroid Gland
Sreejith T
 
Internet browers comparison
Internet browers comparisonInternet browers comparison
Internet browers comparison
ferristic
 
Atrophic rhinitis and Allergic rhinitis-ENT 3rd MBBS
Atrophic rhinitis and Allergic rhinitis-ENT 3rd MBBSAtrophic rhinitis and Allergic rhinitis-ENT 3rd MBBS
Atrophic rhinitis and Allergic rhinitis-ENT 3rd MBBS
Sreejith T
 
Retina 3rd mbbs ophthalmology
Retina 3rd mbbs ophthalmologyRetina 3rd mbbs ophthalmology
Retina 3rd mbbs ophthalmology
Sreejith T
 
TB-Sputum AFB Test
TB-Sputum AFB TestTB-Sputum AFB Test
TB-Sputum AFB Test
Sreejith T
 
Homocystinuria copy
Homocystinuria   copyHomocystinuria   copy
Homocystinuria copy
fatima shah
 
Web browser
Web browserWeb browser
Web browser
Hardik Kakadiya
 
To b1 or to not b1
To b1 or to not b1To b1 or to not b1
To b1 or to not b1
Mariska Roux
 
Search engines
Search enginesSearch engines
Search engines
Sahiba Khurana
 

Viewers also liked (20)

Ti 2
Ti 2Ti 2
Ti 2
 
Credit lab sample links
Credit lab sample linksCredit lab sample links
Credit lab sample links
 
Un gran encuentro
Un gran encuentroUn gran encuentro
Un gran encuentro
 
Tugas linda sri rahayu
Tugas linda sri rahayuTugas linda sri rahayu
Tugas linda sri rahayu
 
Effective presentations skills
Effective presentations skillsEffective presentations skills
Effective presentations skills
 
Web browsertico
Web browserticoWeb browsertico
Web browsertico
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Brugia pahangi & brugia beaveri
Brugia  pahangi  &  brugia  beaveriBrugia  pahangi  &  brugia  beaveri
Brugia pahangi & brugia beaveri
 
Web browers
Web browersWeb browers
Web browers
 
Tugasan ind soalan 1 & 3 baru
Tugasan ind soalan 1 & 3 baruTugasan ind soalan 1 & 3 baru
Tugasan ind soalan 1 & 3 baru
 
Depression and cognitive
Depression and cognitiveDepression and cognitive
Depression and cognitive
 
Clinically Discrete Swellings Of Thyroid Gland
Clinically  Discrete Swellings Of Thyroid GlandClinically  Discrete Swellings Of Thyroid Gland
Clinically Discrete Swellings Of Thyroid Gland
 
Internet browers comparison
Internet browers comparisonInternet browers comparison
Internet browers comparison
 
Atrophic rhinitis and Allergic rhinitis-ENT 3rd MBBS
Atrophic rhinitis and Allergic rhinitis-ENT 3rd MBBSAtrophic rhinitis and Allergic rhinitis-ENT 3rd MBBS
Atrophic rhinitis and Allergic rhinitis-ENT 3rd MBBS
 
Retina 3rd mbbs ophthalmology
Retina 3rd mbbs ophthalmologyRetina 3rd mbbs ophthalmology
Retina 3rd mbbs ophthalmology
 
TB-Sputum AFB Test
TB-Sputum AFB TestTB-Sputum AFB Test
TB-Sputum AFB Test
 
Homocystinuria copy
Homocystinuria   copyHomocystinuria   copy
Homocystinuria copy
 
Web browser
Web browserWeb browser
Web browser
 
To b1 or to not b1
To b1 or to not b1To b1 or to not b1
To b1 or to not b1
 
Search engines
Search enginesSearch engines
Search engines
 

Similar to Computer Security threat

Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Presentation about virus part 1
Presentation about virus part 1Presentation about virus part 1
Presentation about virus part 1
Pasdunrata national collage of Education
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfCH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdf
WajdiElhamzi3
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
INFONAUTICS GmbH
 
Malwares
MalwaresMalwares
Malwares
Ishaq Ticklye
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Safe_IT
Safe_ITSafe_IT
Safe_IT
Trish Bourke
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
jenniel143
 
Malware
MalwareMalware
Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To Malware
Michael Carthy
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
Pradeepkrajyaguru
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
ShouaQureshi
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
JoelGautham
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
WindstoneHealth
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 

Similar to Computer Security threat (20)

Malicious
MaliciousMalicious
Malicious
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Presentation about virus part 1
Presentation about virus part 1Presentation about virus part 1
Presentation about virus part 1
 
Computer virus
Computer virusComputer virus
Computer virus
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfCH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdf
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Malwares
MalwaresMalwares
Malwares
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Safe_IT
Safe_ITSafe_IT
Safe_IT
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Malware
MalwareMalware
Malware
 
Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To Malware
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 

Recently uploaded

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 

Recently uploaded (20)

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 

Computer Security threat

  • 1.
  • 2.  When we use computers it is important to prevent corruption and lost of user data and let user to continue his work without any disturb. For this we must secure our data.  So it is very important to implement good security mechanisms.
  • 3.
  • 4. Unauthorized Action • Hacking • Cracking Malicious software Virus Worm Trojan Horse Time Bomb Logic Bomb
  • 5. Unauthorized Access Hacking • Trying to access or accessing the network by breaching the security by an unauthorized person is known as hacking. • Cheating others account numbers, credit card numbers and misuse them. • Cheating trade secrets, confusing network devices are done by hacking. • The person who does this is called a hacker.
  • 6. Cracking • Changing software content, Serial number, security methods etc. • This done by a programmer who is not licensed to do so is called cracking
  • 7. Malicious software • Malware or Malicious software is software designed to damage a computer system without the owner's concerns. • Malicious software is a general term used by computer professionals to mean a variety of annoying software or program codes. • Malicious software includes Virus, Worm, Trojan, Adware, Root kit, Spyware and many other unwanted software.
  • 8. Computer Virus • A computer virus is a program code that can copy itself and infect a computer without the permission of the user. • In order to replicate itself, a virus must be permitted to execute and write to memory. • For this reason, many viruses attach themselves to an executable files that may be part of legitimate programs. Some viruses change its own code by itself. • Viruses spread via network, floppy disk, CDs, USB drive.
  • 9. Symptoms of a virus attack •Changes file size. •Change system date and time. •Slow down the computer. •Shut down computer unexpectedly. •Take more time to boot computer.
  • 10. Worm • Worm is a self-replicating computer program. • It uses a network to send copies of itself to other systems and it may do so withou any user intervention. • Unlike a virus, it does not need to attach itself to an existing program.
  • 11. Trojan horse • This is a program that disguises itself as program. • Similar to a virus, these programs are hidden and cause an unwanted effect. • They differ from viruses because they are normally not designed to replicate like a virus. •By showing that this is important software running in the computer the Trojan horse opens a back door to the hacker. • There after unauthorized person can get into the computer and do harmful to the user data. E.g.: By opening unknown e-mail attachments
  • 12. Symptoms when Trojan horse affects the computer: •Sending the user’s important details to others. •Changing or deleting data of the computer. •Uploading and downloading data in an unauthorized way. •Spreading malware such as viruses. •Shutting down the computer unexpectedly. •Unauthorized Software installation.
  • 13. Boot sector virus • This is a virus which infects the boot sector of a hard disk or other disk drives. • The boot sector is the portion that stores the boot program that has the code fo loading the operating system file onto memory. • Once the boot sector is infected with the virus, it may rewrite the boot sector making it unbootable or scramble the File Allocation Table (FAT).
  • 14. Symptoms when Boot Sector Virus affect the computer: •Sudden error massages. •Windows restart with a blue screen error message. •Boot Failure. •Fail to format a particular drive.
  • 15. Stealth Virus • These viruses may be one of the type mentioned, but are designed to defeat antivirus scanning and other antiviral software detection method (firewall). • Mode of infection is from fake antivirus and software promoting website. • This virus helps the other viruses too.
  • 16. Spyware • Software that is installed into a computer without the user's knowledge. • Transmits information about the user's computer, and user activities over the Internet. • Redirect to sites which spoil the culture and the computer.
  • 17. Symptoms when Spy ware affects to your computer: • Sending user’s important data to others. • Unauthorized Software installation. • Redirect Web browser to dangerous web sites. • Change Computer settings. • Using anti-spyware we can minimize the damages.
  • 18. Time Bomb • This is simply some code on a computer which does not immediately trigger. • Instead, it is set to cause it's damage at some point in the future. • Usually Time bombs are designed to take revenge towards a company or an organization. ‍ E.g.: Sending messages such as “You are a great FOOL!!!!” on April first. OR “Am the vampire who suck ur blood” at 12 P.M
  • 19. Logic bomb • A logic bomb is a program which will execute a pre-programmed routine when a designated condition is met. • Logic bombs do not make copies of themselves. • Logic bomb work as same as time bomb.
  • 20.
  • 21.  The large scale of creating virus is for business.  Taking revenge.  Like to see others suffering. Mentally Affected  Hobby and fun. For virus creators? How would you feel if your important files are corrupted or deleted? Its pretty bad, it cause redoing all of our work. Therefore, creating and spreading viruses is an activity one must never indulge in. After all, everyone’s work is as precious as our are.