Group # 3
Group # 3
GROUP
PRESENTED BY:
PRESENTED BY:
✓ Alisha Awan (45)
✓ Laiba Arshad (17)
✓ Afsha Saleem (41)
✓ Ifra Mukhtar (22)
✓ Sania Bashir (09)
✓ Haram chaudhary (02)
PRESENTED TO:
Mam SABA
TOPIC:
SECURITY
THREATS
PRESENTATION OUTLINE
➢Physical Threats
Human
External Internal
Physical
Threats
External Threats :
▪ Theft or Loss:
Physical theft of computers or storage devices
can lead to data breaches and compromise
sensitive information. Loss of devices also
poses a risk if they contain valuable or
sensitive data.
▪ Environmental Hazards:
Natural disasters like floods, fires,
earthquakes and power surges can
damage hardware and lead to data
loss.
Internal Threats:
▪ Insider Threats:
Employees , contractors or anyone with internal
access may intentionally or unintentionally
compromise security . This could include theft of
hardware or data, mishandling of equipment or
introducing malware.
Human-Related Threats:
▪ Social Engineering:
Manipulating individuals into revealing sensitive
information or granting access by exploiting human
psychology. This could be through phishing,
pretexting or tailgating.
▪ Negligence:
Accidental damage or loss of hardware such as
spilling liquids on devices or leaving devices
unattended in insecure areas can also pose a
threat.
▪ Malicious Actions:
Spyware
Worms
Non – physical
Threats
Trojan
Denial of
Service
Key - Phishing
Loggers
Malware:
Malware (“malicious software”) is a type of computer
program that infiltrates and damages systems without the
users knowledge. Malware tried to go unnoticed by either
hiding or not letting the user know about its presence on the
system. You may noticed that your system is processing at a
slower rate than usual.
Virus:
It is a program that replicate itself and infects your
computer’s files and programs, rendering them inoperable.
It is a type of malware that spreads by inserting a copy of
itself into and becoming part of another program. It
spreads with the help of software or documents. They are
embedded with software and documents and then
transferred from one computer to another using the
network, a disk, file sharing, or infected e-mail. They
usually as an executable file.
Spyware:
Spyware is a type of computer program that tracks, record and
reports a user’s activity (offline and online) without their
permission for the purpose of profit or data theft. Spyware can
be acquired from a variety of sources including websites ,
instant chats and email. A user may also unwittingly obtain
spyware by adopting a software program’s End User License
Agreement. Adware is a sort of spyware that is primarily
utilized by advertising. When you go online, it keeps track of
your web browsing patterns in order to compile data on the
types of websites your visit.
Worms:
Computer worms are similar to viruses in that they
replicate themselves and can inflict similar damage. Unlike
viruses, which spread by infecting a host file, worms are
freestanding programs that do not require a host program
or human assistance to proliferate. Worms don’t change
programs; instead, they replicate themselves over and
over. They just eat resources to make the system down.
Phishing: