SlideShare a Scribd company logo
1 of 14
By Pratham Gupta
 A computer virus is a type of malicious
software program ("malware") that, when
executed, replicates itself by modifying other
computer programs and inserting its own
code. Infected computer programs can
include, as well, data files, or the "boot"
sector of the hard drive.
 Antivirus software is a type of utility used for
scanning and removing viruses from your
computer. While many types of antivirus (or
"anti-virus") programs exist, their primary
purpose is to protect computers from viruses
and remove any viruses that are found.
 Example: K7, Avast, Quick heal, McAfree,
Norton etc.
 A firewall is a network security system, either
hardware- or software-based, that uses rules
to control incoming and outgoing network
traffic.
 Spyware may be installed on a user's
computer to collect personal information or
monitor internet browsing activities.
 An example of spyware is a adware software
program that records a user's keystrokes on
online advertisements and reports them to a
research or ad firm.
 Anti-spyware software is a type of program
designed to prevent and detect
unwanted spyware program installations and
to remove those programs if installed.
 A form of spyware that collects information
about the user in order to display
advertisement I the web browser based on
the information it collect from the user’s
browsing patterns.
 This is software designed to secretly access a
computer system without the owner’s
consent. A malware can be installed in many
way.
 Phishing is the attempt to obtain sensitive
information such as usernames, passwords,
and credit card details (and money), often for
malicious reasons, by E-mail.
 Vishing (voice or VoIP phishing) is an
electronic fraud tactic in which individuals are
tricked into revealing critical financial or
personal information to unauthorized
entities. Vishing works like phishing but does
not always occur over the Internet and is
carried out using voice technology.
 A vishing attack can be conducted by voice
email, VoIP (voice over IP), or landline
or cellular telephone.
 Fraud devices attached to or inserted into
cash machines and designed to steal card and
PIN data.
 Install and use Anti virus software.
 Take care when reading email with attachment.
 Install and use a firewall program.
 Make a backup of important files and folder.
 Use strong password.
 Use care when downloading and installing
program.
 Don’t talk to unknown persons.
 Don’t share your password to other persons.
 Don’t give respond to any message that in
any way make you feel uncomfortable.
 Don’t share personal images to unknown
persons,
vineetsingh0087@gmail.com

More Related Content

What's hot

Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securityVansh Bathla
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutionshassanmughal4u
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?AariyaRathi
 
Internet security issues
Internet security issuesInternet security issues
Internet security issuesirfan shaikh
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smartKanha Sahu
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacksSugirtha Jasmine M
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Happiest Minds Technologies
 

What's hot (20)

Internet Security
Internet SecurityInternet Security
Internet Security
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Malware
MalwareMalware
Malware
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Spyware
SpywareSpyware
Spyware
 
Computer security
Computer securityComputer security
Computer security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
 
Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
Internet security
Internet securityInternet security
Internet security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Security threats
Security threatsSecurity threats
Security threats
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime
 

Similar to security issues

SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools ollyabraham
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataamiyadutta
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxChaitanyaMundra2
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Information security
Information securityInformation security
Information securityIshaRana14
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 

Similar to security issues (20)

viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Computer security
Computer securityComputer security
Computer security
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
spyware
spywarespyware
spyware
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptx
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Information security
Information securityInformation security
Information security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Seguridad informatica
Seguridad informaticaSeguridad informatica
Seguridad informatica
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 

security issues

  • 2.  A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code. Infected computer programs can include, as well, data files, or the "boot" sector of the hard drive.
  • 3.  Antivirus software is a type of utility used for scanning and removing viruses from your computer. While many types of antivirus (or "anti-virus") programs exist, their primary purpose is to protect computers from viruses and remove any viruses that are found.  Example: K7, Avast, Quick heal, McAfree, Norton etc.
  • 4.  A firewall is a network security system, either hardware- or software-based, that uses rules to control incoming and outgoing network traffic.
  • 5.  Spyware may be installed on a user's computer to collect personal information or monitor internet browsing activities.  An example of spyware is a adware software program that records a user's keystrokes on online advertisements and reports them to a research or ad firm.
  • 6.  Anti-spyware software is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.
  • 7.  A form of spyware that collects information about the user in order to display advertisement I the web browser based on the information it collect from the user’s browsing patterns.
  • 8.  This is software designed to secretly access a computer system without the owner’s consent. A malware can be installed in many way.
  • 9.  Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by E-mail.
  • 10.  Vishing (voice or VoIP phishing) is an electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities. Vishing works like phishing but does not always occur over the Internet and is carried out using voice technology.  A vishing attack can be conducted by voice email, VoIP (voice over IP), or landline or cellular telephone.
  • 11.  Fraud devices attached to or inserted into cash machines and designed to steal card and PIN data.
  • 12.  Install and use Anti virus software.  Take care when reading email with attachment.  Install and use a firewall program.  Make a backup of important files and folder.  Use strong password.  Use care when downloading and installing program.
  • 13.  Don’t talk to unknown persons.  Don’t share your password to other persons.  Don’t give respond to any message that in any way make you feel uncomfortable.  Don’t share personal images to unknown persons,