0% found this document useful (0 votes)
8 views

Group # 3

Uploaded by

ow786777
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Group # 3

Uploaded by

ow786777
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Group ##33

GROUP
PRESENTED BY:
PRESENTED BY:
✓ Alisha Awan (45)
✓ Laiba Arshad (17)
✓ Afsha Saleem (41)
✓ Ifra Mukhtar (22)
✓ Sania Bashir (09)
✓ Haram chaudhary (02)

PRESENTED TO:
Mam SABA
TOPIC:
SECURITY
THREATS
PRESENTATION OUTLINE

❑ What are security threats?


❑ History of computer security threats.
❑ Threats & their effects.
❑ Types of threats.
❑ Measures to protect computer security.
What are security threats ?
Computer security threats are potential threats to your
computer’s efficient operation and performance. These
could be harmless adware or dangerous Trojan
infection. As the world becomes more digital, computer
security concerns are always developing. A threats in a
computer system is a potential danger that could
jeopardize your data security. At times, the damage is
irreversible.
History of computer security threats:

Computer security threats have evolved over time .Early on,


viruses and worms were common, spreading through floppy
disks.
In the’90s, the rise of the internet brought about email-based
threats like phishing. The 2000s saw an increase in malware,
spyware, and the emergence of sophisticated cyber-espionage.
Ransomware became prominent in the 2010s, with attacks
demanding payment for data release . Today, threats, social
engineering, and vulnerabilities in connected devices,
highlighting the ongoing challenge of staying ahead in the
cybersecurity landscape.
❖ 1986 The first virus for PCs:
The first virus foe IBM PCs, Brain, was written by two brothers in
Pakistan, when they noticed that people were copying their software.
The virus put a copy of itself and a copyright message on any floppy
disk copies their customers mode.

❖ 1971 The first worm:


Bob Thomas, a developer working on ARP ANET, a precursor to the
internet, wrote a program called creeper that passed from computer
to computer, displaying a message.

❖ The internet worm:


Robert Morris, a 23 year old student, released a worm on the US
DARPA internet. It spread to thousands of computer and due to an
error, kept re-infecting computer many times, causing them to crash .
❖ 1999 Email viruses:
Melissa, a virus that forward itself by email. Spread worldwide.
Bubble boy, the first virus to infect a computer when email is viewed ,
appeared.

❖ 2000 Denial of service attacks:


“Distributed denial of service” attacks by hackers out yahoo !, eBay,
Amazon and other high profile websites offline for several hours.
Love Bug became the most successful email virus yet.
Threats & their effects:
Threats & their effects:
• Software threats are malicious pieces of computer code and
applications that can damage your computer, as well as steal
your personal or financial information. For this reason, these
dangerous programs are often called malware (short for
“malicious software”) Threats Action
• Electrical blackouts
• Failure of military equipment
• Breaches of national security secrets
• Theft of valuable and sensitive (like medical records, sw code)
• Computer and phone network disruption
• Paralyzation of entire systems
Types Of Threats :

➢Physical Threats

➢Non Physical Threats


Physical Threats:
Physical threats refer to potential dangers or risks
that directly affect the physical components of a
system, device or infrastructure. These threats target
the tangible aspects of technology including
hardware, infrastructure or physical surroundings
with the aim of causing damage, disruption or
unauthorized access.

Human

External Internal

Physical
Threats
External Threats :
▪ Theft or Loss:
Physical theft of computers or storage devices
can lead to data breaches and compromise
sensitive information. Loss of devices also
poses a risk if they contain valuable or
sensitive data.

▪ Environmental Hazards:
Natural disasters like floods, fires,
earthquakes and power surges can
damage hardware and lead to data
loss.
Internal Threats:
▪ Insider Threats:
Employees , contractors or anyone with internal
access may intentionally or unintentionally
compromise security . This could include theft of
hardware or data, mishandling of equipment or
introducing malware.

Human-Related Threats:
▪ Social Engineering:
Manipulating individuals into revealing sensitive
information or granting access by exploiting human
psychology. This could be through phishing,
pretexting or tailgating.
▪ Negligence:
Accidental damage or loss of hardware such as
spilling liquids on devices or leaving devices
unattended in insecure areas can also pose a
threat.

▪ Malicious Actions:

Intentional acts by individuals with the


intent to harm or compromise systems such
as vandalism, sabotage or unauthorized
access to confidential areas.
Non – Physical threats

A non – physical threats is a potential source of


an incident that could result in:

▪ Hampering of the business operations that depend on


computer systems.

▪ Sensitive – data or information loss.

▪ Keeping track of other’s computers system activities


illegally.

▪ Hacking id & passwords of the users, etc.


The non – physical threats can be commonly caused by:
Malware
Virus

Spyware

Worms
Non – physical
Threats

Trojan

Denial of
Service
Key - Phishing
Loggers
Malware:
Malware (“malicious software”) is a type of computer
program that infiltrates and damages systems without the
users knowledge. Malware tried to go unnoticed by either
hiding or not letting the user know about its presence on the
system. You may noticed that your system is processing at a
slower rate than usual.
Virus:
It is a program that replicate itself and infects your
computer’s files and programs, rendering them inoperable.
It is a type of malware that spreads by inserting a copy of
itself into and becoming part of another program. It
spreads with the help of software or documents. They are
embedded with software and documents and then
transferred from one computer to another using the
network, a disk, file sharing, or infected e-mail. They
usually as an executable file.
Spyware:
Spyware is a type of computer program that tracks, record and
reports a user’s activity (offline and online) without their
permission for the purpose of profit or data theft. Spyware can
be acquired from a variety of sources including websites ,
instant chats and email. A user may also unwittingly obtain
spyware by adopting a software program’s End User License
Agreement. Adware is a sort of spyware that is primarily
utilized by advertising. When you go online, it keeps track of
your web browsing patterns in order to compile data on the
types of websites your visit.
Worms:
Computer worms are similar to viruses in that they
replicate themselves and can inflict similar damage. Unlike
viruses, which spread by infecting a host file, worms are
freestanding programs that do not require a host program
or human assistance to proliferate. Worms don’t change
programs; instead, they replicate themselves over and
over. They just eat resources to make the system down.
Phishing:

Phishing is a type of social engineering attack often


used to steal user data, including login credentials
and credit card numbers. It occurs when an attacker ,
masquerading as a trusted entity, dupes a victim into
opening an email, instant message or text message.
Key-logger:
A key logger (key stroke logger) is a tool that captures
every single keystroke from the user to steal sensitive
information including credentials and other
information. A key logger can either store the
information on the computer or can send, it directly to
the server/attacker.
Dos:
▪ Dos stand for Denial of service attack
▪ Denial of service attacks are the major threat to the system
connected to the internet, specially for E-commerce and
government services.
▪ Computer network majority works on client server
architecture. There are number of client sending request to
the same server.
▪ When server cannot respond to client request Dos
condition arrises . Dos occurs when there is a disruption in
sending information.
Measures to protect computer security:
❑ Regularly backup important data to an external source.
❑ Install firewall software and keep it updated every time.
❑ Make use of strong and difficult to crack passwords (having
capital & small alphabets, numbers, and special characters).
❑ Install antivirus/ anti – spyware and keep it update every time.
❑ Timely scan your complete system.
❑ Before installing any program, check whether it is safe to install it
(using Antivirus software).
❑ Take extra caution when reading emails that contain
attachments.
❑ Always keep your system update.
❑ Be cautions of phishing emails and avoid clicking on suspicious
links.
❑ Use a firewall to control incoming and outgoing network traffic.
❑ Avoid downloading files from untrustworthy sources.
❑ Secure your Wi-Fi network with a strong password and
encryption.
❑ Educate yourself on common cybersecurity threats and best
practices.
❑ Use a virtual private network (VPN) for secure internet
connections, especially on public Wi-Fi.
❑ Regularly monitor your accounts for any suspicious
activities.
❑ Think twice before downloading or clicking on anything
unknown.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy