SlideShare a Scribd company logo
Name:-Sunipa Bera
Subject:- IT System Security (ITSS)
Topic:- System Threats
PRN No.:- 190105181016
Roll No.:- 17
B. Tech CSF- SY
An Information Security threats can be many like Software attacks, theft of intellectual property, identity theft, theft of equipment or information,
sabotage, and information extortion.
Threat:- can be anything that can take advantage of a vulnerability to breach security and negatively alter, erase, harm object or objects of interest.
Software attacks:- means attack by Viruses, Worms, Trojan Horses etc. Many users believe that malware, virus, worms, bots are all same things. But
they are not same, only similarity is that they all are malicious software that behave differently.
Malware:- is a combination of 2 terms- Malicious and Software. So Malware basically means malicious software that can be an intrusive program code
or a anything that is designed to perform malicious operations on system.
INTRODUCTION
Program Threats
A program written by a cracker to hijack the
security or to change the behavior of a
normal process.
e.g. Virus, Trojan Horse, Trap Door, Logic
Bomb, etc
These threats involve the abuse of system
services. They strive to create a situation in
which operating-system resources and user files
are misused. They are also used as a medium to
launch program threats.
e. g. Worm, Port Scanning, Denial Of Service,
etc
System
Threats
3
System Threats
• System threats refers to misuse of system services and
network connections to put user in trouble.
• It can be used to launch program threats on a complete
network called as program attack.
• It enables an environment that operating system resources/
user files are misused.
Security of a System can be Threatened via two Breach
An attempt to break security and
make unauthorized use of an asset.
Attack
A program which has the potential
to cause serious damage to the
system.
Threat
Malicious Threats
Harmful computer code or web script design
to create system vulnerabilities leading to
background Security Breaches.
Accidental threats refer to situations in
which damage or data loss occurs as a
result of an insider who has no malicious
intent.
Accidental
Threats
6
Security can be compromised by any of the Breaches mentioned
below:
This type of violation involves the unauthorized reading
of data.
 Breach of Integrity
This violation involves unauthorized modification
of data.
 Breach of Availability
It involves an unauthorized destruction of data.
 Denial of Service
It involves preventing legitimate use of the
system. As mentioned before, such attacks can be
accidental in nature.
It involves an unauthorized use of resources.
Security System Goals
All the resources of the system
must be accessible to all the
authorized users, If such kind of
situation occurs, denial of service
could happen. In this kind of
situation, a malware might hog the
resources for itself & thus
preventing the legitimate
processes from accessing the
system resources.
3. Availability
The objects in the system
mustn’t be accessed by any
unauthorized user & any user
not having sufficient rights
should not be allowed to modify
the important system files and
resources.
The objects of the system must
be accessible only to a limited
number of authorized users.
Not everyone should be able to
view the system files.
1. Integrity
2. Secrecy
Security Measures
Human
Only appropriate users must have the
authorization to access the system.
Phishing(collecting confidential
information) and Dumpster
Diving(collecting basic information so as
to gain unauthorized access) must be
avoided.
The system must protect itself
from accidental or purposeful
security breaches.
The sites containing computer systems
must be physically secured against armed
and malicious intruders. The
workstations must be carefully protected.
Almost all of the information is shared
between different systems via a network.
Intercepting these data could be just as
harmful as breaking into a computer.
Henceforth, Network should be properly
secured against such attacks.
Physical
Networking System
Operating System
• Worm is a process which can choked down a system
performance by using system resources to extreme
levels.
• Its process generates its multiple copies where each
copy uses system resources, prevents all other processes
to get required resources.
• Its processes can even shut down an entire network.
Worms
10
• Port scanning is a mechanism or means by which a hacker can
detects system vulnerabilities to make an attack on the system.
• It is a means by which the cracker identifies the vulnerabilities of
the system to attack.
• It is an automated process which involves creating a TCP/IP
connection to a specific port.
• To protect the identity of the attacker, port scanning attacks are
launched from Zombie Systems, that is systems which were
previously independent systems that are also serving their owners
while being used for such notorious purposes.
11
Port Scanning
• Such attacks aren’t aimed for the purpose of collecting
information or destroying system files. Rather, they are used
for disrupting the legitimate use of a system or facility. These
attacks are generally network based.
• They fall into two categories:
– Attacks in this first category use so many system resources
that no useful work can be performed. For example,
downloading a file from a website that proceeds to use all
available CPU time.
– Attacks in the second category involves disrupting the
network of the facility. These attacks are a result of the abuse of
some fundamental TCP/IP principles.
fundamental functionality of TCP/IP.
Denial of
Service
12
 Tutorialpoint
 Hackerearth
Bibliography
Thank You

More Related Content

What's hot

Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
Aamlan Saswat Mishra
 
Network attacks
Network attacksNetwork attacks
Network attacks
Manjushree Mashal
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
Zara Nawaz
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
A. Shamel
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
FCA - Future Chartered Accountants
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
SecPod Technologies
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
amiyadutta
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
RohitK71
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer SecurityNicholas Davis
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
rajakhurram
 

What's hot (20)

Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Security threats
Security threatsSecurity threats
Security threats
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Computer security
Computer securityComputer security
Computer security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Computer security and
Computer security andComputer security and
Computer security and
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
system Security
system Security system Security
system Security
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer Security
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 

Similar to System tThreats

Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
Komal Mehfooz
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdf
AsmaaLafi1
 
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
SusmitaSaha812194
 
Network security
Network securityNetwork security
Network security
nafisarayhana1
 
Computer security
Computer securityComputer security
Computer security
sruthiKrishnaG
 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptx
VIRAJDEY1
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
MahalakshmiShetty3
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
Pace IT at Edmonds Community College
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
Argie242424
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
Dushyant Singh
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 

Similar to System tThreats (20)

Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
 
Network security
Network securityNetwork security
Network security
 
Computer security
Computer securityComputer security
Computer security
 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptx
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Mitppt
MitpptMitppt
Mitppt
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 

More from Sunipa Bera

hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
Sunipa Bera
 
Ds stack & queue
Ds   stack & queueDs   stack & queue
Ds stack & queue
Sunipa Bera
 
Constructor and Destructor
Constructor and DestructorConstructor and Destructor
Constructor and Destructor
Sunipa Bera
 
Proposition & Logical Operations
Proposition & Logical OperationsProposition & Logical Operations
Proposition & Logical Operations
Sunipa Bera
 
Integral Calculas
Integral CalculasIntegral Calculas
Integral Calculas
Sunipa Bera
 
Basic concept of Engineering Mechanics
Basic concept of Engineering MechanicsBasic concept of Engineering Mechanics
Basic concept of Engineering Mechanics
Sunipa Bera
 
Biogeographical zones of India
Biogeographical zones of IndiaBiogeographical zones of India
Biogeographical zones of India
Sunipa Bera
 
Inflation
InflationInflation
Inflation
Sunipa Bera
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
Sunipa Bera
 
Types of Ecosystem
Types of EcosystemTypes of Ecosystem
Types of Ecosystem
Sunipa Bera
 
Elementary transformation
Elementary transformationElementary transformation
Elementary transformation
Sunipa Bera
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional Intelligence
Sunipa Bera
 
SKYDRIVE
SKYDRIVESKYDRIVE
SKYDRIVE
Sunipa Bera
 
7 cs of effective communication
7 cs of effective communication 7 cs of effective communication
7 cs of effective communication
Sunipa Bera
 
Basics of microprocessor
Basics of microprocessorBasics of microprocessor
Basics of microprocessor
Sunipa Bera
 
Functioning of computer
Functioning of computerFunctioning of computer
Functioning of computer
Sunipa Bera
 
INDIAN ISLAND STUDIES
INDIAN ISLAND STUDIESINDIAN ISLAND STUDIES
INDIAN ISLAND STUDIES
Sunipa Bera
 
GO GREEN - GO ECOFRIENDLY
GO GREEN - GO ECOFRIENDLYGO GREEN - GO ECOFRIENDLY
GO GREEN - GO ECOFRIENDLY
Sunipa Bera
 
INDIA AND HERITAGE
INDIA AND HERITAGEINDIA AND HERITAGE
INDIA AND HERITAGE
Sunipa Bera
 
Happy birthday.rtf
Happy birthday.rtfHappy birthday.rtf
Happy birthday.rtf
Sunipa Bera
 

More from Sunipa Bera (20)

hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
Ds stack & queue
Ds   stack & queueDs   stack & queue
Ds stack & queue
 
Constructor and Destructor
Constructor and DestructorConstructor and Destructor
Constructor and Destructor
 
Proposition & Logical Operations
Proposition & Logical OperationsProposition & Logical Operations
Proposition & Logical Operations
 
Integral Calculas
Integral CalculasIntegral Calculas
Integral Calculas
 
Basic concept of Engineering Mechanics
Basic concept of Engineering MechanicsBasic concept of Engineering Mechanics
Basic concept of Engineering Mechanics
 
Biogeographical zones of India
Biogeographical zones of IndiaBiogeographical zones of India
Biogeographical zones of India
 
Inflation
InflationInflation
Inflation
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
 
Types of Ecosystem
Types of EcosystemTypes of Ecosystem
Types of Ecosystem
 
Elementary transformation
Elementary transformationElementary transformation
Elementary transformation
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional Intelligence
 
SKYDRIVE
SKYDRIVESKYDRIVE
SKYDRIVE
 
7 cs of effective communication
7 cs of effective communication 7 cs of effective communication
7 cs of effective communication
 
Basics of microprocessor
Basics of microprocessorBasics of microprocessor
Basics of microprocessor
 
Functioning of computer
Functioning of computerFunctioning of computer
Functioning of computer
 
INDIAN ISLAND STUDIES
INDIAN ISLAND STUDIESINDIAN ISLAND STUDIES
INDIAN ISLAND STUDIES
 
GO GREEN - GO ECOFRIENDLY
GO GREEN - GO ECOFRIENDLYGO GREEN - GO ECOFRIENDLY
GO GREEN - GO ECOFRIENDLY
 
INDIA AND HERITAGE
INDIA AND HERITAGEINDIA AND HERITAGE
INDIA AND HERITAGE
 
Happy birthday.rtf
Happy birthday.rtfHappy birthday.rtf
Happy birthday.rtf
 

Recently uploaded

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 

Recently uploaded (20)

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

System tThreats

  • 1. Name:-Sunipa Bera Subject:- IT System Security (ITSS) Topic:- System Threats PRN No.:- 190105181016 Roll No.:- 17 B. Tech CSF- SY
  • 2. An Information Security threats can be many like Software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion. Threat:- can be anything that can take advantage of a vulnerability to breach security and negatively alter, erase, harm object or objects of interest. Software attacks:- means attack by Viruses, Worms, Trojan Horses etc. Many users believe that malware, virus, worms, bots are all same things. But they are not same, only similarity is that they all are malicious software that behave differently. Malware:- is a combination of 2 terms- Malicious and Software. So Malware basically means malicious software that can be an intrusive program code or a anything that is designed to perform malicious operations on system. INTRODUCTION
  • 3. Program Threats A program written by a cracker to hijack the security or to change the behavior of a normal process. e.g. Virus, Trojan Horse, Trap Door, Logic Bomb, etc These threats involve the abuse of system services. They strive to create a situation in which operating-system resources and user files are misused. They are also used as a medium to launch program threats. e. g. Worm, Port Scanning, Denial Of Service, etc System Threats 3
  • 4. System Threats • System threats refers to misuse of system services and network connections to put user in trouble. • It can be used to launch program threats on a complete network called as program attack. • It enables an environment that operating system resources/ user files are misused.
  • 5. Security of a System can be Threatened via two Breach An attempt to break security and make unauthorized use of an asset. Attack A program which has the potential to cause serious damage to the system. Threat
  • 6. Malicious Threats Harmful computer code or web script design to create system vulnerabilities leading to background Security Breaches. Accidental threats refer to situations in which damage or data loss occurs as a result of an insider who has no malicious intent. Accidental Threats 6
  • 7. Security can be compromised by any of the Breaches mentioned below: This type of violation involves the unauthorized reading of data.  Breach of Integrity This violation involves unauthorized modification of data.  Breach of Availability It involves an unauthorized destruction of data.  Denial of Service It involves preventing legitimate use of the system. As mentioned before, such attacks can be accidental in nature. It involves an unauthorized use of resources.
  • 8. Security System Goals All the resources of the system must be accessible to all the authorized users, If such kind of situation occurs, denial of service could happen. In this kind of situation, a malware might hog the resources for itself & thus preventing the legitimate processes from accessing the system resources. 3. Availability The objects in the system mustn’t be accessed by any unauthorized user & any user not having sufficient rights should not be allowed to modify the important system files and resources. The objects of the system must be accessible only to a limited number of authorized users. Not everyone should be able to view the system files. 1. Integrity 2. Secrecy
  • 9. Security Measures Human Only appropriate users must have the authorization to access the system. Phishing(collecting confidential information) and Dumpster Diving(collecting basic information so as to gain unauthorized access) must be avoided. The system must protect itself from accidental or purposeful security breaches. The sites containing computer systems must be physically secured against armed and malicious intruders. The workstations must be carefully protected. Almost all of the information is shared between different systems via a network. Intercepting these data could be just as harmful as breaking into a computer. Henceforth, Network should be properly secured against such attacks. Physical Networking System Operating System
  • 10. • Worm is a process which can choked down a system performance by using system resources to extreme levels. • Its process generates its multiple copies where each copy uses system resources, prevents all other processes to get required resources. • Its processes can even shut down an entire network. Worms 10
  • 11. • Port scanning is a mechanism or means by which a hacker can detects system vulnerabilities to make an attack on the system. • It is a means by which the cracker identifies the vulnerabilities of the system to attack. • It is an automated process which involves creating a TCP/IP connection to a specific port. • To protect the identity of the attacker, port scanning attacks are launched from Zombie Systems, that is systems which were previously independent systems that are also serving their owners while being used for such notorious purposes. 11 Port Scanning
  • 12. • Such attacks aren’t aimed for the purpose of collecting information or destroying system files. Rather, they are used for disrupting the legitimate use of a system or facility. These attacks are generally network based. • They fall into two categories: – Attacks in this first category use so many system resources that no useful work can be performed. For example, downloading a file from a website that proceeds to use all available CPU time. – Attacks in the second category involves disrupting the network of the facility. These attacks are a result of the abuse of some fundamental TCP/IP principles. fundamental functionality of TCP/IP. Denial of Service 12