SlideShare a Scribd company logo
Security Threats
Topics Of
Today’s
Discussion
Introduction
Consequences
Types of Threats
Untrusted Sources
Computer Security Actions
About Antivirus Software
What is Security Threats ?
 Threats
Anything that can harm your computer.
Security attempts to neutralize threats.
CIA triad
Confidentiality
Integrity
Availability
Consequences of ignoring security threats
• Back to back attack
• Loss of confidential data
• Identity theft
• Theft of data integrity
• Damage to computing system
Add a Slide Title - 1
Add a Slide Title - 2
Add a Slide Title - 3
ADD A SLIDE TITLE - 5
How Do Bad Guys Compromise Your Computer
Security -
1. Social Engineering-
Social engineering is a non- technical method of intrusion
hackers use that relies heavily on human interaction and often
involves tricking people into breaking normal security
procedures Types of social engineering -Baiting Phishing
pretexting
2. Reverse social engineering attack -
In this kind of Cyber attack, the attacker convinces a user that
they have a problem and that the attacker has a solution to the
problem.
3.Virus-
Virus is a program that replicates it spreads from file to file on
your system in fitting them .
4.Worm-
worm is a standalone program that doesn't require user
intervention to separate worms don't infect existing files they
spread copies of themselves instead.
Group no:12 Roll no:312004 Name:Shruti Devidas Angre
• 5. Trojan-
• Trojan horses pose as useful software ,such as a
legitimate program.Instead of being well-behaved software ,a
Trojan opens a backdoor on your system .
6.Ransomeware –
• Ransomware is a malicious program that performs
the following malicious activities after infecting a computer .
• *Makes the system non- functional unless the victim agrees to
pay a ransom .
• *Encrypts the computers data and demands a ransom to
release it to the victim.
Group no:12 Roll no:312004 Name:Shruti Devidas Angre
7.Spyware-
A common computer security threat ,spyware is a class of
malicious program that secretly steals your personal
information and sends it to the advertisers or hackers .
8.Rogue Antivirus -
A rogue antivirus ,also known as scareware ,a fake
program that disguises itself as a genuine software but
performs malicious activities in user's machine.
9.Rootkit -
• A rootkit is a program (or a collection of
programs )that in itself is not harmful ,but the
helps viruses and malware hide from antivirus
software.
Group no:12 Roll no:312004 Name:Shruti Devidas Angre
Top Computer Security Actions
1. Patch
2. Install Security software
3. Choose strong passwords
4. Backup
5. Control access to machine
6. Use email and internet safely
7. Protect sensitive data
8. Use desktop firewalls
9. Use secure connections
How quick heal takes care of your computer security
• Safe banking
• Core Protecton
• Advanced DNAscan
• Firewall
• Browser Sandbox
• Web security
• Email Security
• Vulnerability Scanner
References
• http://en.wikipedia.org/wiki/Computer_security
• http://its.ucsc.edu/security/training/intro.html
• http://www.technologyxperts.com/uncategorized/top-10-safe-
computing-tips/
• http://blogs.quickheal.com/wp/a-laymans-glossary-of-computer-
security-threats-part-1/
• http://blogs.quickheal.com/wp/common-security-threats-glossary-
part-ii/
thanks!
ANY QUESTIONS?
You can find me at:
▫ @https://www.linkedin.com/in/Kalyani-raut-29756a10a
▫ kalyaniraut97@gmail.com
22

More Related Content

Similar to Security Threats.pptx

IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
RamaNingaiah
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
Ian Dave Balatbat
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
ssuser6c59cb
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
nidhidgowda185
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Bernad Bear
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
RONIKMEHRA
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
NihanthReddyBalaiahg
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
JoeMarieDormido2
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Priyanshu Ratnakar
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
Quick Heal Technologies Ltd.
 

Similar to Security Threats.pptx (20)

IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 

More from Kalyani Raut

Scheduling.pptx
Scheduling.pptxScheduling.pptx
Scheduling.pptx
Kalyani Raut
 
Liner Power Supply.pptx
Liner Power Supply.pptxLiner Power Supply.pptx
Liner Power Supply.pptx
Kalyani Raut
 
Security Misconfiguration.pptx
Security Misconfiguration.pptxSecurity Misconfiguration.pptx
Security Misconfiguration.pptx
Kalyani Raut
 
Tarot Cards Interpretation.pptx
Tarot Cards Interpretation.pptxTarot Cards Interpretation.pptx
Tarot Cards Interpretation.pptx
Kalyani Raut
 
MOTIVATIONAL Quotes.pptx
MOTIVATIONAL Quotes.pptxMOTIVATIONAL Quotes.pptx
MOTIVATIONAL Quotes.pptx
Kalyani Raut
 
GOOD_HABIT.pptx
GOOD_HABIT.pptxGOOD_HABIT.pptx
GOOD_HABIT.pptx
Kalyani Raut
 

More from Kalyani Raut (6)

Scheduling.pptx
Scheduling.pptxScheduling.pptx
Scheduling.pptx
 
Liner Power Supply.pptx
Liner Power Supply.pptxLiner Power Supply.pptx
Liner Power Supply.pptx
 
Security Misconfiguration.pptx
Security Misconfiguration.pptxSecurity Misconfiguration.pptx
Security Misconfiguration.pptx
 
Tarot Cards Interpretation.pptx
Tarot Cards Interpretation.pptxTarot Cards Interpretation.pptx
Tarot Cards Interpretation.pptx
 
MOTIVATIONAL Quotes.pptx
MOTIVATIONAL Quotes.pptxMOTIVATIONAL Quotes.pptx
MOTIVATIONAL Quotes.pptx
 
GOOD_HABIT.pptx
GOOD_HABIT.pptxGOOD_HABIT.pptx
GOOD_HABIT.pptx
 

Recently uploaded

Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 

Recently uploaded (20)

Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 

Security Threats.pptx

  • 2. Topics Of Today’s Discussion Introduction Consequences Types of Threats Untrusted Sources Computer Security Actions About Antivirus Software
  • 3. What is Security Threats ?  Threats Anything that can harm your computer. Security attempts to neutralize threats.
  • 5. Consequences of ignoring security threats • Back to back attack • Loss of confidential data • Identity theft • Theft of data integrity • Damage to computing system
  • 6.
  • 7.
  • 8.
  • 9. Add a Slide Title - 1
  • 10. Add a Slide Title - 2
  • 11. Add a Slide Title - 3
  • 12.
  • 13.
  • 14. ADD A SLIDE TITLE - 5 How Do Bad Guys Compromise Your Computer Security -
  • 15. 1. Social Engineering- Social engineering is a non- technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures Types of social engineering -Baiting Phishing pretexting
  • 16. 2. Reverse social engineering attack - In this kind of Cyber attack, the attacker convinces a user that they have a problem and that the attacker has a solution to the problem. 3.Virus- Virus is a program that replicates it spreads from file to file on your system in fitting them . 4.Worm- worm is a standalone program that doesn't require user intervention to separate worms don't infect existing files they spread copies of themselves instead. Group no:12 Roll no:312004 Name:Shruti Devidas Angre
  • 17. • 5. Trojan- • Trojan horses pose as useful software ,such as a legitimate program.Instead of being well-behaved software ,a Trojan opens a backdoor on your system . 6.Ransomeware – • Ransomware is a malicious program that performs the following malicious activities after infecting a computer . • *Makes the system non- functional unless the victim agrees to pay a ransom . • *Encrypts the computers data and demands a ransom to release it to the victim. Group no:12 Roll no:312004 Name:Shruti Devidas Angre
  • 18. 7.Spyware- A common computer security threat ,spyware is a class of malicious program that secretly steals your personal information and sends it to the advertisers or hackers . 8.Rogue Antivirus - A rogue antivirus ,also known as scareware ,a fake program that disguises itself as a genuine software but performs malicious activities in user's machine. 9.Rootkit - • A rootkit is a program (or a collection of programs )that in itself is not harmful ,but the helps viruses and malware hide from antivirus software. Group no:12 Roll no:312004 Name:Shruti Devidas Angre
  • 19. Top Computer Security Actions 1. Patch 2. Install Security software 3. Choose strong passwords 4. Backup 5. Control access to machine 6. Use email and internet safely 7. Protect sensitive data 8. Use desktop firewalls 9. Use secure connections
  • 20. How quick heal takes care of your computer security • Safe banking • Core Protecton • Advanced DNAscan • Firewall • Browser Sandbox • Web security • Email Security • Vulnerability Scanner
  • 21. References • http://en.wikipedia.org/wiki/Computer_security • http://its.ucsc.edu/security/training/intro.html • http://www.technologyxperts.com/uncategorized/top-10-safe- computing-tips/ • http://blogs.quickheal.com/wp/a-laymans-glossary-of-computer- security-threats-part-1/ • http://blogs.quickheal.com/wp/common-security-threats-glossary- part-ii/
  • 22. thanks! ANY QUESTIONS? You can find me at: ▫ @https://www.linkedin.com/in/Kalyani-raut-29756a10a ▫ kalyaniraut97@gmail.com 22