Presented by
Dr Mohammad Zunnun Khan
 Any attempt to intrude into a computer or a
network without authorization is called hacking.
 This involves changing of system or security
features in a bid to accomplish a goal that differs
from the intended purpose of the system.
 An individual who involves themselves in hacking
activities is known as a hacker, and some
companies employ hackers as part of their support
staff.
 These kind of hackers use their skills to find flaws
in the company security system, to prevent
identity theft and other computer-related crimes
against the company.
 The most common are white hats, black hats and grey
hats.
 White hats hack to check their own security systems to
make it more hack-proof. In most cases, they are part of
the same organization.
 Black hat hackers hack to take control over the system
for personal gains. They destroy, steal and even
prevent authorized users from accessing the system, by
finding loopholes and weaknesses in the system.
 Grey hat hackers comprise curious people who have
just about enough computer language skills to enable
them to hack a system to locate potential loopholes in
the network security system. They then notify the
network system admin about the weaknesses
discovered in the system.
 A cracker is someone who breaks into a
network; bypasses passwords or licenses in
computer programs; or in other ways
intentionally breaches computer security.
 Crackers also act as Black Hats: by gaining
access to the accounts of people maliciously
and misusing this information across networks.
 They can steal credit card information, they can
destroy important files, disclose crucial data
and information or personal details and sell
them for personal gains.
 The basic difference is that a hacker uses their
extensive knowledge of computer logic and
code, while a cracker looks for back doors in
programs, and exploits those back doors.
 Hackers break into the security systems for the
sole purpose of checking the holes in the
system and works on rectifying these while as
the Cracker breaks into the security system for
criminal and illegal reasons or for personal
gains.
 Malware is a program designed to gain access
to computer systems, normally for the benefit
of some third party, without the user’s
permission.
 Malware includes computer viruses, worms,
Trojan horses, ransomware, spyware and other
malicious programs.
 A Virus is a malicious executable code attached to
another executable file.
 The virus spreads when an infected file is passed
from system to system. Viruses can be harmless or
they can modify or delete data.
 Opening a file can trigger a virus. Once a program
virus is active, it will infect other programs on the
computer.
 Worms replicate themselves on the system,
attaching themselves to different files and
looking for pathways between computers, such
as computer network that shares common file
storage areas.
 Worms usually slow down networks. A virus
needs a host program to run but worms can
run by themselves.
 After a worm affects a host, it is able to spread
very quickly over the network.
 Its purpose is to steal private information from
a computer system for a third party.
 Spyware collects information and sends it to
the hacker.
 A Trojan horse is malware that carries out
malicious operations under the appearance of
a desired operation such as playing an online
game.
 A Trojan horse varies from a virus because the
Trojan binds itself to non-executable files,
such as image files, audio files.
 A logic bomb is a malicious program that uses a
trigger to activate the malicious code.
 The logic bomb remains non-functioning until
that trigger event happens.
 Once triggered, a logic bomb implements a
malicious code that causes harm to a computer.
 Cybersecurity specialists recently discovered logic
bombs that attack and destroy the hardware
components in a workstation or server including
the cooling fans, hard drives, and power supplies.
 The logic bomb overdrives these devices until they
overheat or fail.
 Ransomware grasps a computer system or the
data it contains until the victim makes a
payment.
 Ransomware encrypts data in the computer
with a key which is unknown to the user.
 The user has to pay a ransom (price) to the
criminals to retrieve data.
 Once the amount is paid the victim can resume
using his/her system.
 A backdoor bypasses the usual authentication
used to access a system.
 The purpose of the backdoor is to grant the
cyber criminals future access to the system
even if the organization fixes the original
vulnerability used to attack the system.
 A rootkit modifies the OS to make a backdoor.
 Attackers then use the backdoor to access the
computer distantly.
 Most rootkits take advantage of software
vulnerabilities to modify system files.
Keylogger records everything the user types on
his/her computer system to obtain passwords
and other sensitive information and send them
to the source of the keylogging program.
 Thank You
for any Queries contact on the given email id
zunnunkhan@gmail.com

Security threats

  • 1.
  • 2.
     Any attemptto intrude into a computer or a network without authorization is called hacking.  This involves changing of system or security features in a bid to accomplish a goal that differs from the intended purpose of the system.  An individual who involves themselves in hacking activities is known as a hacker, and some companies employ hackers as part of their support staff.  These kind of hackers use their skills to find flaws in the company security system, to prevent identity theft and other computer-related crimes against the company.
  • 3.
     The mostcommon are white hats, black hats and grey hats.  White hats hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organization.  Black hat hackers hack to take control over the system for personal gains. They destroy, steal and even prevent authorized users from accessing the system, by finding loopholes and weaknesses in the system.  Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. They then notify the network system admin about the weaknesses discovered in the system.
  • 4.
     A crackeris someone who breaks into a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.  Crackers also act as Black Hats: by gaining access to the accounts of people maliciously and misusing this information across networks.  They can steal credit card information, they can destroy important files, disclose crucial data and information or personal details and sell them for personal gains.
  • 5.
     The basicdifference is that a hacker uses their extensive knowledge of computer logic and code, while a cracker looks for back doors in programs, and exploits those back doors.  Hackers break into the security systems for the sole purpose of checking the holes in the system and works on rectifying these while as the Cracker breaks into the security system for criminal and illegal reasons or for personal gains.
  • 6.
     Malware isa program designed to gain access to computer systems, normally for the benefit of some third party, without the user’s permission.  Malware includes computer viruses, worms, Trojan horses, ransomware, spyware and other malicious programs.
  • 7.
     A Virusis a malicious executable code attached to another executable file.  The virus spreads when an infected file is passed from system to system. Viruses can be harmless or they can modify or delete data.  Opening a file can trigger a virus. Once a program virus is active, it will infect other programs on the computer.
  • 8.
     Worms replicatethemselves on the system, attaching themselves to different files and looking for pathways between computers, such as computer network that shares common file storage areas.  Worms usually slow down networks. A virus needs a host program to run but worms can run by themselves.  After a worm affects a host, it is able to spread very quickly over the network.
  • 9.
     Its purposeis to steal private information from a computer system for a third party.  Spyware collects information and sends it to the hacker.
  • 10.
     A Trojanhorse is malware that carries out malicious operations under the appearance of a desired operation such as playing an online game.  A Trojan horse varies from a virus because the Trojan binds itself to non-executable files, such as image files, audio files.
  • 11.
     A logicbomb is a malicious program that uses a trigger to activate the malicious code.  The logic bomb remains non-functioning until that trigger event happens.  Once triggered, a logic bomb implements a malicious code that causes harm to a computer.  Cybersecurity specialists recently discovered logic bombs that attack and destroy the hardware components in a workstation or server including the cooling fans, hard drives, and power supplies.  The logic bomb overdrives these devices until they overheat or fail.
  • 12.
     Ransomware graspsa computer system or the data it contains until the victim makes a payment.  Ransomware encrypts data in the computer with a key which is unknown to the user.  The user has to pay a ransom (price) to the criminals to retrieve data.  Once the amount is paid the victim can resume using his/her system.
  • 13.
     A backdoorbypasses the usual authentication used to access a system.  The purpose of the backdoor is to grant the cyber criminals future access to the system even if the organization fixes the original vulnerability used to attack the system.
  • 14.
     A rootkitmodifies the OS to make a backdoor.  Attackers then use the backdoor to access the computer distantly.  Most rootkits take advantage of software vulnerabilities to modify system files.
  • 15.
    Keylogger records everythingthe user types on his/her computer system to obtain passwords and other sensitive information and send them to the source of the keylogging program.
  • 16.
     Thank You forany Queries contact on the given email id zunnunkhan@gmail.com