SlideShare a Scribd company logo
1 of 16
Presented by
Dr Mohammad Zunnun Khan
 Any attempt to intrude into a computer or a
network without authorization is called hacking.
 This involves changing of system or security
features in a bid to accomplish a goal that differs
from the intended purpose of the system.
 An individual who involves themselves in hacking
activities is known as a hacker, and some
companies employ hackers as part of their support
staff.
 These kind of hackers use their skills to find flaws
in the company security system, to prevent
identity theft and other computer-related crimes
against the company.
 The most common are white hats, black hats and grey
hats.
 White hats hack to check their own security systems to
make it more hack-proof. In most cases, they are part of
the same organization.
 Black hat hackers hack to take control over the system
for personal gains. They destroy, steal and even
prevent authorized users from accessing the system, by
finding loopholes and weaknesses in the system.
 Grey hat hackers comprise curious people who have
just about enough computer language skills to enable
them to hack a system to locate potential loopholes in
the network security system. They then notify the
network system admin about the weaknesses
discovered in the system.
 A cracker is someone who breaks into a
network; bypasses passwords or licenses in
computer programs; or in other ways
intentionally breaches computer security.
 Crackers also act as Black Hats: by gaining
access to the accounts of people maliciously
and misusing this information across networks.
 They can steal credit card information, they can
destroy important files, disclose crucial data
and information or personal details and sell
them for personal gains.
 The basic difference is that a hacker uses their
extensive knowledge of computer logic and
code, while a cracker looks for back doors in
programs, and exploits those back doors.
 Hackers break into the security systems for the
sole purpose of checking the holes in the
system and works on rectifying these while as
the Cracker breaks into the security system for
criminal and illegal reasons or for personal
gains.
 Malware is a program designed to gain access
to computer systems, normally for the benefit
of some third party, without the user’s
permission.
 Malware includes computer viruses, worms,
Trojan horses, ransomware, spyware and other
malicious programs.
 A Virus is a malicious executable code attached to
another executable file.
 The virus spreads when an infected file is passed
from system to system. Viruses can be harmless or
they can modify or delete data.
 Opening a file can trigger a virus. Once a program
virus is active, it will infect other programs on the
computer.
 Worms replicate themselves on the system,
attaching themselves to different files and
looking for pathways between computers, such
as computer network that shares common file
storage areas.
 Worms usually slow down networks. A virus
needs a host program to run but worms can
run by themselves.
 After a worm affects a host, it is able to spread
very quickly over the network.
 Its purpose is to steal private information from
a computer system for a third party.
 Spyware collects information and sends it to
the hacker.
 A Trojan horse is malware that carries out
malicious operations under the appearance of
a desired operation such as playing an online
game.
 A Trojan horse varies from a virus because the
Trojan binds itself to non-executable files,
such as image files, audio files.
 A logic bomb is a malicious program that uses a
trigger to activate the malicious code.
 The logic bomb remains non-functioning until
that trigger event happens.
 Once triggered, a logic bomb implements a
malicious code that causes harm to a computer.
 Cybersecurity specialists recently discovered logic
bombs that attack and destroy the hardware
components in a workstation or server including
the cooling fans, hard drives, and power supplies.
 The logic bomb overdrives these devices until they
overheat or fail.
 Ransomware grasps a computer system or the
data it contains until the victim makes a
payment.
 Ransomware encrypts data in the computer
with a key which is unknown to the user.
 The user has to pay a ransom (price) to the
criminals to retrieve data.
 Once the amount is paid the victim can resume
using his/her system.
 A backdoor bypasses the usual authentication
used to access a system.
 The purpose of the backdoor is to grant the
cyber criminals future access to the system
even if the organization fixes the original
vulnerability used to attack the system.
 A rootkit modifies the OS to make a backdoor.
 Attackers then use the backdoor to access the
computer distantly.
 Most rootkits take advantage of software
vulnerabilities to modify system files.
Keylogger records everything the user types on
his/her computer system to obtain passwords
and other sensitive information and send them
to the source of the keylogging program.
 Thank You
for any Queries contact on the given email id
zunnunkhan@gmail.com

More Related Content

What's hot

What's hot (20)

Backdoor
BackdoorBackdoor
Backdoor
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
Hacker !
Hacker !Hacker !
Hacker !
 
Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
system Security
system Security system Security
system Security
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Case study
Case studyCase study
Case study
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Hacking
HackingHacking
Hacking
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
 
Software security
Software securitySoftware security
Software security
 
h@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in androidh@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in android
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 

Similar to Security threats

Similar to Security threats (20)

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Presentation
PresentationPresentation
Presentation
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Unit 7
Unit 7Unit 7
Unit 7
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
Computer security
Computer securityComputer security
Computer security
 
It act seminar
It act seminarIt act seminar
It act seminar
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 

More from Integral university, India (18)

Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Unit4 next
Unit4 nextUnit4 next
Unit4 next
 
U nit 4
U nit 4U nit 4
U nit 4
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Unit4
Unit4Unit4
Unit4
 
Unit5
Unit5Unit5
Unit5
 
Unit5 Cloud Federation,
Unit5 Cloud Federation,Unit5 Cloud Federation,
Unit5 Cloud Federation,
 
Unit3 MapReduce
Unit3 MapReduceUnit3 MapReduce
Unit3 MapReduce
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Software Security
Software SecuritySoftware Security
Software Security
 
Block Level and File Level
Block Level and File LevelBlock Level and File Level
Block Level and File Level
 
Software Security
Software SecuritySoftware Security
Software Security
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Security threats

  • 2.  Any attempt to intrude into a computer or a network without authorization is called hacking.  This involves changing of system or security features in a bid to accomplish a goal that differs from the intended purpose of the system.  An individual who involves themselves in hacking activities is known as a hacker, and some companies employ hackers as part of their support staff.  These kind of hackers use their skills to find flaws in the company security system, to prevent identity theft and other computer-related crimes against the company.
  • 3.  The most common are white hats, black hats and grey hats.  White hats hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organization.  Black hat hackers hack to take control over the system for personal gains. They destroy, steal and even prevent authorized users from accessing the system, by finding loopholes and weaknesses in the system.  Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. They then notify the network system admin about the weaknesses discovered in the system.
  • 4.  A cracker is someone who breaks into a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.  Crackers also act as Black Hats: by gaining access to the accounts of people maliciously and misusing this information across networks.  They can steal credit card information, they can destroy important files, disclose crucial data and information or personal details and sell them for personal gains.
  • 5.  The basic difference is that a hacker uses their extensive knowledge of computer logic and code, while a cracker looks for back doors in programs, and exploits those back doors.  Hackers break into the security systems for the sole purpose of checking the holes in the system and works on rectifying these while as the Cracker breaks into the security system for criminal and illegal reasons or for personal gains.
  • 6.  Malware is a program designed to gain access to computer systems, normally for the benefit of some third party, without the user’s permission.  Malware includes computer viruses, worms, Trojan horses, ransomware, spyware and other malicious programs.
  • 7.  A Virus is a malicious executable code attached to another executable file.  The virus spreads when an infected file is passed from system to system. Viruses can be harmless or they can modify or delete data.  Opening a file can trigger a virus. Once a program virus is active, it will infect other programs on the computer.
  • 8.  Worms replicate themselves on the system, attaching themselves to different files and looking for pathways between computers, such as computer network that shares common file storage areas.  Worms usually slow down networks. A virus needs a host program to run but worms can run by themselves.  After a worm affects a host, it is able to spread very quickly over the network.
  • 9.  Its purpose is to steal private information from a computer system for a third party.  Spyware collects information and sends it to the hacker.
  • 10.  A Trojan horse is malware that carries out malicious operations under the appearance of a desired operation such as playing an online game.  A Trojan horse varies from a virus because the Trojan binds itself to non-executable files, such as image files, audio files.
  • 11.  A logic bomb is a malicious program that uses a trigger to activate the malicious code.  The logic bomb remains non-functioning until that trigger event happens.  Once triggered, a logic bomb implements a malicious code that causes harm to a computer.  Cybersecurity specialists recently discovered logic bombs that attack and destroy the hardware components in a workstation or server including the cooling fans, hard drives, and power supplies.  The logic bomb overdrives these devices until they overheat or fail.
  • 12.  Ransomware grasps a computer system or the data it contains until the victim makes a payment.  Ransomware encrypts data in the computer with a key which is unknown to the user.  The user has to pay a ransom (price) to the criminals to retrieve data.  Once the amount is paid the victim can resume using his/her system.
  • 13.  A backdoor bypasses the usual authentication used to access a system.  The purpose of the backdoor is to grant the cyber criminals future access to the system even if the organization fixes the original vulnerability used to attack the system.
  • 14.  A rootkit modifies the OS to make a backdoor.  Attackers then use the backdoor to access the computer distantly.  Most rootkits take advantage of software vulnerabilities to modify system files.
  • 15. Keylogger records everything the user types on his/her computer system to obtain passwords and other sensitive information and send them to the source of the keylogging program.
  • 16.  Thank You for any Queries contact on the given email id zunnunkhan@gmail.com