SlideShare a Scribd company logo
1 of 23
Computer
Security Threats
& Prevention
By: M.Jawad & Adnan
What is a Threat?
In computer security a threat is a possible
danger that might exploit a vulnerability to
breach security and thus cause possible harm.
A threat can be either "intentional" (i.e.,
intelligent; e.g., an individual cracker or a
criminal organization) or "accidental" (e.g., the
possibility of a computer malfunctioning, or the
possibility of a natural disaster such as an
earthquake, a fire, or a tornado) or otherwise a
circumstance, capability, action, or event
History of computer security
threats.
 1986 The first virus for PCs
The first virus for IBM PCs, Brain, was written by two
brothers in Pakistan, when they noticed that people
were copying their software. The virus put a copy of
itself and a copyright message on any floppy disk
copies their customers made.
 1971 The first worm
Bob Thomas, a developer working on ARPANET, a
precursor to the Internet, wrote a program called
Creeper that passed from computer to computer,
displaying a message.
 1988 The Internet Worm
Robert Morris, a 23-year-old student, released a
worm on the US DARPA Internet. It spread to
thousands of computers and, due to an error, kept
re-infecting computers many times, causing them to
crash.
 1999 Email viruses
Melissa, a virus that forwards itself by email, spread
worldwide. Bubbleboy, the first virus to infect a
computer when email is viewed, appeared.
 2000 Denial-of-service attacks
“Distributed denial-of-service” attacks by hackers
put Yahoo!, eBay, Amazon and other high profile
websites offline for several hours.
Love Bug became the most successful email virus
yet.
Threats and their types
There are so many types of threats but we will discus here today about
software threats.
 Malware
 Trojans
 Virus
 Firewall breech
 Computer Policy Disturbance
 Bugs and Flaws
 Adware
 Backdoors
 Email Trojans
 DDOS
 Cookies
 Keylogging
ect….
Definitions and theory
 Virus:
Perhaps the most well known computer
security threat, a computer virus is a program written
to alter the way a computer operates, without the
permission or knowledge of the user. A virus
replicates and executes itself, usually doing damage
to your computer in the process.
 Spyware:
A serious computer security threat, spyware is
any program that monitors your online activities or
installs programs without your consent for profit or to
capture personal information.
 Backdoors:
A backdoor Trojan allows someone to
take control of another user’s computer via the
internet without their permission.
A backdoor Trojan may pose as legitimate
software, just as other Trojan horse programs.
 Cookies:
Cookies are fi les on your computer that
enable websites to remember your details.
When you visit a website, it can place a fi le
called a cookie on your computer. This enables
the website to remember your details and track
your visits. Cookies can be a threat to
confidentiality, but not to your data.
 DDOS (Denial-of-service attack):
A denial-of-service (DoS) attack prevents
users from accessing a computer or website. In
a DoS attack, a hacker attempts to overload or
shut down a computer, so that legitimate users
can no longer access it. Typical DoS attacks
target web servers and aim to make websites
unavailable. No data is stolen or compromised,
but the interruption to the service can be costly
for a company.
 Email Trojans:
Many of the most prolific viruses distribute
themselves automatically by email. Typically,
email-aware viruses depend on the user
double-clicking on an attachment.
This runs the malicious code, which will then mail
itself to other people from that computer.
 Boot Sector Malware:
When you turn on a computer, the hardware
looks for the boot sector program, which is usually on
the hard disk (but can be on a CD/DVD or
FlashDrive), and runs it. This program then loads the
rest of the operating system into memory.
Boot sector malware replaces the original boot
sector with its own, modified version (and usually
hides the original somewhere else on the hard disk).
The next time you start up, the infected boot sector is
used and the malware becomes active.
 Autorun worm:
Autorun worms are malicious programs that
take advantage of the Windows AutoRun feature.
They execute automatically when the device on
which they are stored is plugged into a computer.
 Keylogging:
Keylogging is the proces of secretly
recording keystrokes by an unauthorized
third party. Keylogging is often used by
malware to steal usernames, passwords,
credit card details and other sensitive data.
Threats Ratio
Statics and Reports from all
over the Globe. (2013)
Targeted operating systems and softwares
By countries
Computer Infection level TOP 20
World Map
Prevention
Identify your weaknesses. Like a fort that surrounds a castle, your protection is
only as strong as your weakest point. Review how your company and your clients
access your network. Make sure every entry point is secured with passwords and
encryption.
Install anti-virus software on your computers. Many Internet service providers
supply these with your agreement. But if they don’t, invest in an anti-virus
program to prevent malware attacks on your system.
Install perimeter security solutions. There are three types of network perimeter
security:
1) Firewall – Prevents unauthorized Internet users from accessing your private
network via the Internet
2) Intrusion Detection System – Monitors and reports on threats to your network
3) Intrusion Prevention Program – Stops threats as well as reports on them
Use a spam filter. You can either install spam filtering
software on your computer or network server, buy a
dedicated appliance or outsource spam filtering to
an online service provider. The software option is
typically more budget-friendly, but online services
may be more effective and more suitable for higher
volumes of emails.
Backup your important data. Identify the vital data
you need to protect - accounting information,
business plans, customer databases, vendor
information, marketing documents, etc. Then,
choose from offline and online data backup
solutions to ensure the security and availability of
your critical business information. Set a backup
schedule and test your solutions regularly.
Encrypt your files, hard drives and backup disks. By
encrypting your hardware and data, only people with
a valid password will have access. It’s a necessary step.
Set up a virtual private network (VPN). By creating a
VPN, team members working from home or on the road
using Wi-Fi in public won’t be exposing your business to
security threats.
Automate security updates. By enabling auto updates,
your computer will always have the most recent form of
software and anti-virus programs installed.
Restrict total access. Don’t give all team members
universal access to every part of your network. Protect
sensitive files and databases with passwords that only
your key people know.
Monitor network traffic. Install software or
hardware that keeps an eye on who’s visiting
which sites and which of your computers
they’re using.
Review your security periodically. Stay aware of
new security threats and improved solutions by
visiting your security software/service vendor
websites. As your business grows, you may need
to take new security measures.
Don’t host your business website. Consider using
a website hosting service that will take care of
your website’s security needs and provide
redundancy, which will allow your website to be
properly restored if attacked.
Add example video from
YouTube
Web and Document
References
 Wikipedia
 Kaspersky Lab
 Kaspersky Security Bulletin (2013)
 Security Magazine (2013)
 Webroot
 Sophos
 Norton
 ESET NOD 32
 Securelist
 Youtube
Computer security threats & prevention

More Related Content

What's hot

What's hot (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Computer security
Computer securityComputer security
Computer security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Anti virus
Anti virusAnti virus
Anti virus
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
What is malware
What is malwareWhat is malware
What is malware
 
Network security
Network securityNetwork security
Network security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Viewers also liked

Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardShafaan Khaliq Bhatti
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network securityJoe McCarthy
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & AttacksNetwax Lab
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Ali Raw
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard) Sina Manavi
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 

Viewers also liked (18)

Security threats
Security threatsSecurity threats
Security threats
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 

Similar to Computer security threats & prevention

How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protectionphanleson
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 

Similar to Computer security threats & prevention (20)

How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
computer security
computer securitycomputer security
computer security
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
viruses
virusesviruses
viruses
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 

Recently uploaded

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

Computer security threats & prevention

  • 2.
  • 3. What is a Threat? In computer security a threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm. A threat can be either "intentional" (i.e., intelligent; e.g., an individual cracker or a criminal organization) or "accidental" (e.g., the possibility of a computer malfunctioning, or the possibility of a natural disaster such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event
  • 4. History of computer security threats.  1986 The first virus for PCs The first virus for IBM PCs, Brain, was written by two brothers in Pakistan, when they noticed that people were copying their software. The virus put a copy of itself and a copyright message on any floppy disk copies their customers made.  1971 The first worm Bob Thomas, a developer working on ARPANET, a precursor to the Internet, wrote a program called Creeper that passed from computer to computer, displaying a message.
  • 5.  1988 The Internet Worm Robert Morris, a 23-year-old student, released a worm on the US DARPA Internet. It spread to thousands of computers and, due to an error, kept re-infecting computers many times, causing them to crash.  1999 Email viruses Melissa, a virus that forwards itself by email, spread worldwide. Bubbleboy, the first virus to infect a computer when email is viewed, appeared.  2000 Denial-of-service attacks “Distributed denial-of-service” attacks by hackers put Yahoo!, eBay, Amazon and other high profile websites offline for several hours. Love Bug became the most successful email virus yet.
  • 6. Threats and their types There are so many types of threats but we will discus here today about software threats.  Malware  Trojans  Virus  Firewall breech  Computer Policy Disturbance  Bugs and Flaws  Adware  Backdoors  Email Trojans  DDOS  Cookies  Keylogging ect….
  • 7. Definitions and theory  Virus: Perhaps the most well known computer security threat, a computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user. A virus replicates and executes itself, usually doing damage to your computer in the process.  Spyware: A serious computer security threat, spyware is any program that monitors your online activities or installs programs without your consent for profit or to capture personal information.
  • 8.  Backdoors: A backdoor Trojan allows someone to take control of another user’s computer via the internet without their permission. A backdoor Trojan may pose as legitimate software, just as other Trojan horse programs.  Cookies: Cookies are fi les on your computer that enable websites to remember your details. When you visit a website, it can place a fi le called a cookie on your computer. This enables the website to remember your details and track your visits. Cookies can be a threat to confidentiality, but not to your data.
  • 9.  DDOS (Denial-of-service attack): A denial-of-service (DoS) attack prevents users from accessing a computer or website. In a DoS attack, a hacker attempts to overload or shut down a computer, so that legitimate users can no longer access it. Typical DoS attacks target web servers and aim to make websites unavailable. No data is stolen or compromised, but the interruption to the service can be costly for a company.  Email Trojans: Many of the most prolific viruses distribute themselves automatically by email. Typically, email-aware viruses depend on the user double-clicking on an attachment. This runs the malicious code, which will then mail itself to other people from that computer.
  • 10.  Boot Sector Malware: When you turn on a computer, the hardware looks for the boot sector program, which is usually on the hard disk (but can be on a CD/DVD or FlashDrive), and runs it. This program then loads the rest of the operating system into memory. Boot sector malware replaces the original boot sector with its own, modified version (and usually hides the original somewhere else on the hard disk). The next time you start up, the infected boot sector is used and the malware becomes active.  Autorun worm: Autorun worms are malicious programs that take advantage of the Windows AutoRun feature. They execute automatically when the device on which they are stored is plugged into a computer.
  • 11.  Keylogging: Keylogging is the proces of secretly recording keystrokes by an unauthorized third party. Keylogging is often used by malware to steal usernames, passwords, credit card details and other sensitive data.
  • 12. Threats Ratio Statics and Reports from all over the Globe. (2013)
  • 13. Targeted operating systems and softwares
  • 17. Prevention Identify your weaknesses. Like a fort that surrounds a castle, your protection is only as strong as your weakest point. Review how your company and your clients access your network. Make sure every entry point is secured with passwords and encryption. Install anti-virus software on your computers. Many Internet service providers supply these with your agreement. But if they don’t, invest in an anti-virus program to prevent malware attacks on your system. Install perimeter security solutions. There are three types of network perimeter security: 1) Firewall – Prevents unauthorized Internet users from accessing your private network via the Internet 2) Intrusion Detection System – Monitors and reports on threats to your network 3) Intrusion Prevention Program – Stops threats as well as reports on them
  • 18. Use a spam filter. You can either install spam filtering software on your computer or network server, buy a dedicated appliance or outsource spam filtering to an online service provider. The software option is typically more budget-friendly, but online services may be more effective and more suitable for higher volumes of emails. Backup your important data. Identify the vital data you need to protect - accounting information, business plans, customer databases, vendor information, marketing documents, etc. Then, choose from offline and online data backup solutions to ensure the security and availability of your critical business information. Set a backup schedule and test your solutions regularly.
  • 19. Encrypt your files, hard drives and backup disks. By encrypting your hardware and data, only people with a valid password will have access. It’s a necessary step. Set up a virtual private network (VPN). By creating a VPN, team members working from home or on the road using Wi-Fi in public won’t be exposing your business to security threats. Automate security updates. By enabling auto updates, your computer will always have the most recent form of software and anti-virus programs installed. Restrict total access. Don’t give all team members universal access to every part of your network. Protect sensitive files and databases with passwords that only your key people know.
  • 20. Monitor network traffic. Install software or hardware that keeps an eye on who’s visiting which sites and which of your computers they’re using. Review your security periodically. Stay aware of new security threats and improved solutions by visiting your security software/service vendor websites. As your business grows, you may need to take new security measures. Don’t host your business website. Consider using a website hosting service that will take care of your website’s security needs and provide redundancy, which will allow your website to be properly restored if attacked.
  • 21. Add example video from YouTube
  • 22. Web and Document References  Wikipedia  Kaspersky Lab  Kaspersky Security Bulletin (2013)  Security Magazine (2013)  Webroot  Sophos  Norton  ESET NOD 32  Securelist  Youtube