4. Computer or IT security
It is the protection of information systems
From theft or damage to the hardware,the
software and to the information on them.
5. What is a security breach ?
It is a break-in.
Eg : if someone smashes a window and
climbe’s into your home, that’s a security
breach.
If the intruder snatches your documents and
personal information and climbs back out the
window , that’s a data breach!
Security breaches happen a lot- not in your
house , but in large and small organisations.
6. Types of security Breaches
Attackers can use different types of security
breaches.
1. Probe
2. Scan
3. Account compromise
4. Root compromise
5. Packet sniffer
6. Denial of service
7. Exploitation of trust
8. Malicious code
9. Internet infrastructure attacks
10. How it can be injected to your
system?
Through
Trojans
Viruses
Ransomware
Adware
Rootkits
Worms etc
11.
12. Ransomware
First ransomware was created by Russian
criminals in 2005
It is a type of malware that treatens to publish
victims data
Or purposefully blockes access to it unless a
ransom is paid.
Files are zipped and password protected.
14. From where do this comes?
Spam emails
Misleading links
Fake software updates
Exploiting vulnerabilities in web browser and
popular softwares.
15. Trojan
s It is known as trojan horse
It looks like a normal application
But it carries the virus inside it
It comes out when positive situation comes
22. Keylogger
Technology/virus used to monitor and record
each keystroke typed
Advantages
• Parents to supervise children’s internet
useage.
• Device owners to track unauthorised activities