SlideShare a Scribd company logo
Presented by
Dr Mohammad Zunnun Khan
 Any attempt to intrude into a computer or a
network without authorization is called hacking.
 This involves changing of system or security
features in a bid to accomplish a goal that differs
from the intended purpose of the system.
 An individual who involves themselves in hacking
activities is known as a hacker, and some
companies employ hackers as part of their support
staff.
 These kind of hackers use their skills to find flaws
in the company security system, to prevent
identity theft and other computer-related crimes
against the company.
 The most common are white hats, black hats and grey
hats.
 White hats hack to check their own security systems to
make it more hack-proof. In most cases, they are part of
the same organization.
 Black hat hackers hack to take control over the system
for personal gains. They destroy, steal and even
prevent authorized users from accessing the system, by
finding loopholes and weaknesses in the system.
 Grey hat hackers comprise curious people who have
just about enough computer language skills to enable
them to hack a system to locate potential loopholes in
the network security system. They then notify the
network system admin about the weaknesses
discovered in the system.
 A cracker is someone who breaks into a
network; bypasses passwords or licenses in
computer programs; or in other ways
intentionally breaches computer security.
 Crackers also act as Black Hats: by gaining
access to the accounts of people maliciously
and misusing this information across networks.
 They can steal credit card information, they can
destroy important files, disclose crucial data
and information or personal details and sell
them for personal gains.
 The basic difference is that a hacker uses their
extensive knowledge of computer logic and
code, while a cracker looks for back doors in
programs, and exploits those back doors.
 Hackers break into the security systems for the
sole purpose of checking the holes in the
system and works on rectifying these while as
the Cracker breaks into the security system for
criminal and illegal reasons or for personal
gains.
 Malware is a program designed to gain access
to computer systems, normally for the benefit
of some third party, without the user’s
permission.
 Malware includes computer viruses, worms,
Trojan horses, ransomware, spyware and other
malicious programs.
 A Virus is a malicious executable code attached to
another executable file.
 The virus spreads when an infected file is passed
from system to system. Viruses can be harmless or
they can modify or delete data.
 Opening a file can trigger a virus. Once a program
virus is active, it will infect other programs on the
computer.
 Worms replicate themselves on the system,
attaching themselves to different files and
looking for pathways between computers, such
as computer network that shares common file
storage areas.
 Worms usually slow down networks. A virus
needs a host program to run but worms can
run by themselves.
 After a worm affects a host, it is able to spread
very quickly over the network.
 Its purpose is to steal private information from
a computer system for a third party.
 Spyware collects information and sends it to
the hacker.
 A Trojan horse is malware that carries out
malicious operations under the appearance of
a desired operation such as playing an online
game.
 A Trojan horse varies from a virus because the
Trojan binds itself to non-executable files,
such as image files, audio files.
 A logic bomb is a malicious program that uses a
trigger to activate the malicious code.
 The logic bomb remains non-functioning until
that trigger event happens.
 Once triggered, a logic bomb implements a
malicious code that causes harm to a computer.
 Cybersecurity specialists recently discovered logic
bombs that attack and destroy the hardware
components in a workstation or server including
the cooling fans, hard drives, and power supplies.
 The logic bomb overdrives these devices until they
overheat or fail.
 Ransomware grasps a computer system or the
data it contains until the victim makes a
payment.
 Ransomware encrypts data in the computer
with a key which is unknown to the user.
 The user has to pay a ransom (price) to the
criminals to retrieve data.
 Once the amount is paid the victim can resume
using his/her system.
 A backdoor bypasses the usual authentication
used to access a system.
 The purpose of the backdoor is to grant the
cyber criminals future access to the system
even if the organization fixes the original
vulnerability used to attack the system.
 A rootkit modifies the OS to make a backdoor.
 Attackers then use the backdoor to access the
computer distantly.
 Most rootkits take advantage of software
vulnerabilities to modify system files.
Keylogger records everything the user types on
his/her computer system to obtain passwords
and other sensitive information and send them
to the source of the keylogging program.
 Thank You
for any Queries contact on the given email id
zunnunkhan@gmail.com

More Related Content

What's hot

Backdoor
BackdoorBackdoor
Backdoor
phanleson
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N GHafizra Mas
 
Hacker !
Hacker !Hacker !
Hacker !
Mahmoud Saeed
 
Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1
Shobhit Sharma
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
Computer securety
Computer securetyComputer securety
Computer securety
rushil ahmed
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
Alex Havaianas
 
Hacking
HackingHacking
Hacking
Virus
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
IT Department Akre
 
Software security
Software securitySoftware security
Software security
jes_d
 
h@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in androidh@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in android
jaswanth chodavarapu
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
Abdelhamid Limami
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
mubeenm50
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
Nugala Sathesh Chowdary
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)Angel Sophie
 

What's hot (20)

Backdoor
BackdoorBackdoor
Backdoor
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
Hacker !
Hacker !Hacker !
Hacker !
 
Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
system Security
system Security system Security
system Security
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Case study
Case studyCase study
Case study
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Hacking
HackingHacking
Hacking
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
 
Software security
Software securitySoftware security
Software security
 
h@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in androidh@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in android
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 

Similar to Security threats

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
Klaus Drosch
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
Sumit Satam
 
Dickmaster
DickmasterDickmaster
Dickmaster
DickMaster1
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
Ali Asghar Jafari Lari
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
EC-Council
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Debabrata Singh
 
Computer security
Computer securityComputer security
Computer security
sruthiKrishnaG
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
 

Similar to Security threats (20)

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Presentation
PresentationPresentation
Presentation
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Unit 7
Unit 7Unit 7
Unit 7
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
Computer security
Computer securityComputer security
Computer security
 
It act seminar
It act seminarIt act seminar
It act seminar
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 

More from Integral university, India

Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
Integral university, India
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
Integral university, India
 
Cyber crime
Cyber crimeCyber crime
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
Integral university, India
 
U nit 4
U nit 4U nit 4
Unit4
Unit4Unit4
Unit5 Cloud Federation,
Unit5 Cloud Federation,Unit5 Cloud Federation,
Unit5 Cloud Federation,
Integral university, India
 
Unit3 MapReduce
Unit3 MapReduceUnit3 MapReduce
Cyber crime
Cyber crimeCyber crime
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
Integral university, India
 
Cyber crime
Cyber crimeCyber crime
Software Security
Software SecuritySoftware Security
Software Security
Integral university, India
 
Block Level and File Level
Block Level and File LevelBlock Level and File Level
Block Level and File Level
Integral university, India
 
Software Security
Software SecuritySoftware Security
Software Security
Integral university, India
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
Integral university, India
 

More from Integral university, India (18)

Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Unit4 next
Unit4 nextUnit4 next
Unit4 next
 
U nit 4
U nit 4U nit 4
U nit 4
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Unit4
Unit4Unit4
Unit4
 
Unit5
Unit5Unit5
Unit5
 
Unit5 Cloud Federation,
Unit5 Cloud Federation,Unit5 Cloud Federation,
Unit5 Cloud Federation,
 
Unit3 MapReduce
Unit3 MapReduceUnit3 MapReduce
Unit3 MapReduce
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Software Security
Software SecuritySoftware Security
Software Security
 
Block Level and File Level
Block Level and File LevelBlock Level and File Level
Block Level and File Level
 
Software Security
Software SecuritySoftware Security
Software Security
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Security threats

  • 2.  Any attempt to intrude into a computer or a network without authorization is called hacking.  This involves changing of system or security features in a bid to accomplish a goal that differs from the intended purpose of the system.  An individual who involves themselves in hacking activities is known as a hacker, and some companies employ hackers as part of their support staff.  These kind of hackers use their skills to find flaws in the company security system, to prevent identity theft and other computer-related crimes against the company.
  • 3.  The most common are white hats, black hats and grey hats.  White hats hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organization.  Black hat hackers hack to take control over the system for personal gains. They destroy, steal and even prevent authorized users from accessing the system, by finding loopholes and weaknesses in the system.  Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. They then notify the network system admin about the weaknesses discovered in the system.
  • 4.  A cracker is someone who breaks into a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.  Crackers also act as Black Hats: by gaining access to the accounts of people maliciously and misusing this information across networks.  They can steal credit card information, they can destroy important files, disclose crucial data and information or personal details and sell them for personal gains.
  • 5.  The basic difference is that a hacker uses their extensive knowledge of computer logic and code, while a cracker looks for back doors in programs, and exploits those back doors.  Hackers break into the security systems for the sole purpose of checking the holes in the system and works on rectifying these while as the Cracker breaks into the security system for criminal and illegal reasons or for personal gains.
  • 6.  Malware is a program designed to gain access to computer systems, normally for the benefit of some third party, without the user’s permission.  Malware includes computer viruses, worms, Trojan horses, ransomware, spyware and other malicious programs.
  • 7.  A Virus is a malicious executable code attached to another executable file.  The virus spreads when an infected file is passed from system to system. Viruses can be harmless or they can modify or delete data.  Opening a file can trigger a virus. Once a program virus is active, it will infect other programs on the computer.
  • 8.  Worms replicate themselves on the system, attaching themselves to different files and looking for pathways between computers, such as computer network that shares common file storage areas.  Worms usually slow down networks. A virus needs a host program to run but worms can run by themselves.  After a worm affects a host, it is able to spread very quickly over the network.
  • 9.  Its purpose is to steal private information from a computer system for a third party.  Spyware collects information and sends it to the hacker.
  • 10.  A Trojan horse is malware that carries out malicious operations under the appearance of a desired operation such as playing an online game.  A Trojan horse varies from a virus because the Trojan binds itself to non-executable files, such as image files, audio files.
  • 11.  A logic bomb is a malicious program that uses a trigger to activate the malicious code.  The logic bomb remains non-functioning until that trigger event happens.  Once triggered, a logic bomb implements a malicious code that causes harm to a computer.  Cybersecurity specialists recently discovered logic bombs that attack and destroy the hardware components in a workstation or server including the cooling fans, hard drives, and power supplies.  The logic bomb overdrives these devices until they overheat or fail.
  • 12.  Ransomware grasps a computer system or the data it contains until the victim makes a payment.  Ransomware encrypts data in the computer with a key which is unknown to the user.  The user has to pay a ransom (price) to the criminals to retrieve data.  Once the amount is paid the victim can resume using his/her system.
  • 13.  A backdoor bypasses the usual authentication used to access a system.  The purpose of the backdoor is to grant the cyber criminals future access to the system even if the organization fixes the original vulnerability used to attack the system.
  • 14.  A rootkit modifies the OS to make a backdoor.  Attackers then use the backdoor to access the computer distantly.  Most rootkits take advantage of software vulnerabilities to modify system files.
  • 15. Keylogger records everything the user types on his/her computer system to obtain passwords and other sensitive information and send them to the source of the keylogging program.
  • 16.  Thank You for any Queries contact on the given email id zunnunkhan@gmail.com