尊敬的 微信汇率:1円 ≈ 0.046078 元 支付宝汇率:1円 ≈ 0.046168元 [退出登录]
SlideShare a Scribd company logo
Presented by
Dr Mohammad Zunnun Khan
 Any attempt to intrude into a computer or a
network without authorization is called hacking.
 This involves changing of system or security
features in a bid to accomplish a goal that differs
from the intended purpose of the system.
 An individual who involves themselves in hacking
activities is known as a hacker, and some
companies employ hackers as part of their support
staff.
 These kind of hackers use their skills to find flaws
in the company security system, to prevent
identity theft and other computer-related crimes
against the company.
 The most common are white hats, black hats and grey
hats.
 White hats hack to check their own security systems to
make it more hack-proof. In most cases, they are part of
the same organization.
 Black hat hackers hack to take control over the system
for personal gains. They destroy, steal and even
prevent authorized users from accessing the system, by
finding loopholes and weaknesses in the system.
 Grey hat hackers comprise curious people who have
just about enough computer language skills to enable
them to hack a system to locate potential loopholes in
the network security system. They then notify the
network system admin about the weaknesses
discovered in the system.
 A cracker is someone who breaks into a
network; bypasses passwords or licenses in
computer programs; or in other ways
intentionally breaches computer security.
 Crackers also act as Black Hats: by gaining
access to the accounts of people maliciously
and misusing this information across networks.
 They can steal credit card information, they can
destroy important files, disclose crucial data
and information or personal details and sell
them for personal gains.
 The basic difference is that a hacker uses their
extensive knowledge of computer logic and
code, while a cracker looks for back doors in
programs, and exploits those back doors.
 Hackers break into the security systems for the
sole purpose of checking the holes in the
system and works on rectifying these while as
the Cracker breaks into the security system for
criminal and illegal reasons or for personal
gains.
 Malware is a program designed to gain access
to computer systems, normally for the benefit
of some third party, without the user’s
permission.
 Malware includes computer viruses, worms,
Trojan horses, ransomware, spyware and other
malicious programs.
 A Virus is a malicious executable code attached to
another executable file.
 The virus spreads when an infected file is passed
from system to system. Viruses can be harmless or
they can modify or delete data.
 Opening a file can trigger a virus. Once a program
virus is active, it will infect other programs on the
computer.
 Worms replicate themselves on the system,
attaching themselves to different files and
looking for pathways between computers, such
as computer network that shares common file
storage areas.
 Worms usually slow down networks. A virus
needs a host program to run but worms can
run by themselves.
 After a worm affects a host, it is able to spread
very quickly over the network.
 Its purpose is to steal private information from
a computer system for a third party.
 Spyware collects information and sends it to
the hacker.
 A Trojan horse is malware that carries out
malicious operations under the appearance of
a desired operation such as playing an online
game.
 A Trojan horse varies from a virus because the
Trojan binds itself to non-executable files,
such as image files, audio files.
 A logic bomb is a malicious program that uses a
trigger to activate the malicious code.
 The logic bomb remains non-functioning until
that trigger event happens.
 Once triggered, a logic bomb implements a
malicious code that causes harm to a computer.
 Cybersecurity specialists recently discovered logic
bombs that attack and destroy the hardware
components in a workstation or server including
the cooling fans, hard drives, and power supplies.
 The logic bomb overdrives these devices until they
overheat or fail.
 Ransomware grasps a computer system or the
data it contains until the victim makes a
payment.
 Ransomware encrypts data in the computer
with a key which is unknown to the user.
 The user has to pay a ransom (price) to the
criminals to retrieve data.
 Once the amount is paid the victim can resume
using his/her system.
 A backdoor bypasses the usual authentication
used to access a system.
 The purpose of the backdoor is to grant the
cyber criminals future access to the system
even if the organization fixes the original
vulnerability used to attack the system.
 A rootkit modifies the OS to make a backdoor.
 Attackers then use the backdoor to access the
computer distantly.
 Most rootkits take advantage of software
vulnerabilities to modify system files.
Keylogger records everything the user types on
his/her computer system to obtain passwords
and other sensitive information and send them
to the source of the keylogging program.
 Thank You
for any Queries contact on the given email id
zunnunkhan@gmail.com

More Related Content

What's hot

Backdoor
BackdoorBackdoor
Backdoor
phanleson
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
Hafizra Mas
 
Program Threats
Program ThreatsProgram Threats
Program Threats
guestab0ee0
 
Hacker !
Hacker !Hacker !
Hacker !
Mahmoud Saeed
 
Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1
Shobhit Sharma
 
my new HACKING
my new HACKINGmy new HACKING
system Security
system Security system Security
system Security
Gaurav Mishra
 
Computer securety
Computer securetyComputer securety
Computer securety
rushil ahmed
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
Case study
Case studyCase study
Case study
IvoNne Hndz
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
Alex Havaianas
 
Hacking
HackingHacking
Hacking
Virus
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
IT Department Akre
 
Software security
Software securitySoftware security
Software security
jes_d
 
h@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in androidh@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in android
jaswanth chodavarapu
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
Abdelhamid Limami
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
mubeenm50
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
Nugala Sathesh Chowdary
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
Angel Sophie
 

What's hot (20)

Backdoor
BackdoorBackdoor
Backdoor
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
Hacker !
Hacker !Hacker !
Hacker !
 
Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
system Security
system Security system Security
system Security
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Case study
Case studyCase study
Case study
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Hacking
HackingHacking
Hacking
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
 
Software security
Software securitySoftware security
Software security
 
h@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in androidh@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in android
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 

Similar to Security threats

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Presentation
PresentationPresentation
Presentation
Nishant Barot
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
Klaus Drosch
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
aashish2cool4u
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.pdf
Module 5.pdfModule 5.pdf
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
Mirza Adnan Baig
 
Unit 7
Unit 7Unit 7
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
Sumit Satam
 
Dickmaster
DickmasterDickmaster
Dickmaster
DickMaster1
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
seth edmond
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
Ali Asghar Jafari Lari
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
EC-Council
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Debabrata Singh
 
Computer security
Computer securityComputer security
Computer security
sruthiKrishnaG
 
It act seminar
It act seminarIt act seminar
It act seminar
Akshay Sharma
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
 

Similar to Security threats (20)

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Presentation
PresentationPresentation
Presentation
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Unit 7
Unit 7Unit 7
Unit 7
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
Computer security
Computer securityComputer security
Computer security
 
It act seminar
It act seminarIt act seminar
It act seminar
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 

More from Integral university, India

Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
Integral university, India
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
Integral university, India
 
Cyber crime
Cyber crimeCyber crime
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
Integral university, India
 
Unit4 next
Unit4 nextUnit4 next
U nit 4
U nit 4U nit 4
Unit4 cry
Unit4 cryUnit4 cry
Unit4
Unit4Unit4
Unit5
Unit5Unit5
Unit5 Cloud Federation,
Unit5 Cloud Federation,Unit5 Cloud Federation,
Unit5 Cloud Federation,
Integral university, India
 
Unit3 MapReduce
Unit3 MapReduceUnit3 MapReduce
Cyber crime
Cyber crimeCyber crime
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
Integral university, India
 
Cyber crime
Cyber crimeCyber crime
Software Security
Software SecuritySoftware Security
Software Security
Integral university, India
 
Block Level and File Level
Block Level and File LevelBlock Level and File Level
Block Level and File Level
Integral university, India
 
Software Security
Software SecuritySoftware Security
Software Security
Integral university, India
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
Integral university, India
 

More from Integral university, India (18)

Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Unit4 next
Unit4 nextUnit4 next
Unit4 next
 
U nit 4
U nit 4U nit 4
U nit 4
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Unit4
Unit4Unit4
Unit4
 
Unit5
Unit5Unit5
Unit5
 
Unit5 Cloud Federation,
Unit5 Cloud Federation,Unit5 Cloud Federation,
Unit5 Cloud Federation,
 
Unit3 MapReduce
Unit3 MapReduceUnit3 MapReduce
Unit3 MapReduce
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Software Security
Software SecuritySoftware Security
Software Security
 
Block Level and File Level
Block Level and File LevelBlock Level and File Level
Block Level and File Level
 
Software Security
Software SecuritySoftware Security
Software Security
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
 

Recently uploaded

Getting Started Using the National Research Platform
Getting Started Using the National Research PlatformGetting Started Using the National Research Platform
Getting Started Using the National Research Platform
Larry Smarr
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
Larry Smarr
 
How to Optimize Call Monitoring: Automate QA and Elevate Customer Experience
How to Optimize Call Monitoring: Automate QA and Elevate Customer ExperienceHow to Optimize Call Monitoring: Automate QA and Elevate Customer Experience
How to Optimize Call Monitoring: Automate QA and Elevate Customer Experience
Aggregage
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
Supplier Sourcing Presentation - Gay De La Cruz.pdf
Supplier Sourcing Presentation - Gay De La Cruz.pdfSupplier Sourcing Presentation - Gay De La Cruz.pdf
Supplier Sourcing Presentation - Gay De La Cruz.pdf
gaydlc2513
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
Kieran Kunhya
 
The Strategy Behind ReversingLabs’ Massive Key-Value Migration
The Strategy Behind ReversingLabs’ Massive Key-Value MigrationThe Strategy Behind ReversingLabs’ Massive Key-Value Migration
The Strategy Behind ReversingLabs’ Massive Key-Value Migration
ScyllaDB
 
Move Auth, Policy, and Resilience to the Platform
Move Auth, Policy, and Resilience to the PlatformMove Auth, Policy, and Resilience to the Platform
Move Auth, Policy, and Resilience to the Platform
Christian Posta
 
The "Zen" of Python Exemplars - OTel Community Day
The "Zen" of Python Exemplars - OTel Community DayThe "Zen" of Python Exemplars - OTel Community Day
The "Zen" of Python Exemplars - OTel Community Day
Paige Cruz
 
Chapter 6 - Test Tools Considerations V4.0
Chapter 6 - Test Tools Considerations V4.0Chapter 6 - Test Tools Considerations V4.0
Chapter 6 - Test Tools Considerations V4.0
Neeraj Kumar Singh
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes
 
Leveraging AI for Software Developer Productivity.pptx
Leveraging AI for Software Developer Productivity.pptxLeveraging AI for Software Developer Productivity.pptx
Leveraging AI for Software Developer Productivity.pptx
petabridge
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
dipikamodels1
 
Ubuntu Server CLI cheat sheet 2024 v6.pdf
Ubuntu Server CLI cheat sheet 2024 v6.pdfUbuntu Server CLI cheat sheet 2024 v6.pdf
Ubuntu Server CLI cheat sheet 2024 v6.pdf
TechOnDemandSolution
 

Recently uploaded (20)

Getting Started Using the National Research Platform
Getting Started Using the National Research PlatformGetting Started Using the National Research Platform
Getting Started Using the National Research Platform
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
 
How to Optimize Call Monitoring: Automate QA and Elevate Customer Experience
How to Optimize Call Monitoring: Automate QA and Elevate Customer ExperienceHow to Optimize Call Monitoring: Automate QA and Elevate Customer Experience
How to Optimize Call Monitoring: Automate QA and Elevate Customer Experience
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
Supplier Sourcing Presentation - Gay De La Cruz.pdf
Supplier Sourcing Presentation - Gay De La Cruz.pdfSupplier Sourcing Presentation - Gay De La Cruz.pdf
Supplier Sourcing Presentation - Gay De La Cruz.pdf
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
 
The Strategy Behind ReversingLabs’ Massive Key-Value Migration
The Strategy Behind ReversingLabs’ Massive Key-Value MigrationThe Strategy Behind ReversingLabs’ Massive Key-Value Migration
The Strategy Behind ReversingLabs’ Massive Key-Value Migration
 
Move Auth, Policy, and Resilience to the Platform
Move Auth, Policy, and Resilience to the PlatformMove Auth, Policy, and Resilience to the Platform
Move Auth, Policy, and Resilience to the Platform
 
The "Zen" of Python Exemplars - OTel Community Day
The "Zen" of Python Exemplars - OTel Community DayThe "Zen" of Python Exemplars - OTel Community Day
The "Zen" of Python Exemplars - OTel Community Day
 
Chapter 6 - Test Tools Considerations V4.0
Chapter 6 - Test Tools Considerations V4.0Chapter 6 - Test Tools Considerations V4.0
Chapter 6 - Test Tools Considerations V4.0
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
 
Leveraging AI for Software Developer Productivity.pptx
Leveraging AI for Software Developer Productivity.pptxLeveraging AI for Software Developer Productivity.pptx
Leveraging AI for Software Developer Productivity.pptx
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
 
Ubuntu Server CLI cheat sheet 2024 v6.pdf
Ubuntu Server CLI cheat sheet 2024 v6.pdfUbuntu Server CLI cheat sheet 2024 v6.pdf
Ubuntu Server CLI cheat sheet 2024 v6.pdf
 

Security threats

  • 2.  Any attempt to intrude into a computer or a network without authorization is called hacking.  This involves changing of system or security features in a bid to accomplish a goal that differs from the intended purpose of the system.  An individual who involves themselves in hacking activities is known as a hacker, and some companies employ hackers as part of their support staff.  These kind of hackers use their skills to find flaws in the company security system, to prevent identity theft and other computer-related crimes against the company.
  • 3.  The most common are white hats, black hats and grey hats.  White hats hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organization.  Black hat hackers hack to take control over the system for personal gains. They destroy, steal and even prevent authorized users from accessing the system, by finding loopholes and weaknesses in the system.  Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. They then notify the network system admin about the weaknesses discovered in the system.
  • 4.  A cracker is someone who breaks into a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.  Crackers also act as Black Hats: by gaining access to the accounts of people maliciously and misusing this information across networks.  They can steal credit card information, they can destroy important files, disclose crucial data and information or personal details and sell them for personal gains.
  • 5.  The basic difference is that a hacker uses their extensive knowledge of computer logic and code, while a cracker looks for back doors in programs, and exploits those back doors.  Hackers break into the security systems for the sole purpose of checking the holes in the system and works on rectifying these while as the Cracker breaks into the security system for criminal and illegal reasons or for personal gains.
  • 6.  Malware is a program designed to gain access to computer systems, normally for the benefit of some third party, without the user’s permission.  Malware includes computer viruses, worms, Trojan horses, ransomware, spyware and other malicious programs.
  • 7.  A Virus is a malicious executable code attached to another executable file.  The virus spreads when an infected file is passed from system to system. Viruses can be harmless or they can modify or delete data.  Opening a file can trigger a virus. Once a program virus is active, it will infect other programs on the computer.
  • 8.  Worms replicate themselves on the system, attaching themselves to different files and looking for pathways between computers, such as computer network that shares common file storage areas.  Worms usually slow down networks. A virus needs a host program to run but worms can run by themselves.  After a worm affects a host, it is able to spread very quickly over the network.
  • 9.  Its purpose is to steal private information from a computer system for a third party.  Spyware collects information and sends it to the hacker.
  • 10.  A Trojan horse is malware that carries out malicious operations under the appearance of a desired operation such as playing an online game.  A Trojan horse varies from a virus because the Trojan binds itself to non-executable files, such as image files, audio files.
  • 11.  A logic bomb is a malicious program that uses a trigger to activate the malicious code.  The logic bomb remains non-functioning until that trigger event happens.  Once triggered, a logic bomb implements a malicious code that causes harm to a computer.  Cybersecurity specialists recently discovered logic bombs that attack and destroy the hardware components in a workstation or server including the cooling fans, hard drives, and power supplies.  The logic bomb overdrives these devices until they overheat or fail.
  • 12.  Ransomware grasps a computer system or the data it contains until the victim makes a payment.  Ransomware encrypts data in the computer with a key which is unknown to the user.  The user has to pay a ransom (price) to the criminals to retrieve data.  Once the amount is paid the victim can resume using his/her system.
  • 13.  A backdoor bypasses the usual authentication used to access a system.  The purpose of the backdoor is to grant the cyber criminals future access to the system even if the organization fixes the original vulnerability used to attack the system.
  • 14.  A rootkit modifies the OS to make a backdoor.  Attackers then use the backdoor to access the computer distantly.  Most rootkits take advantage of software vulnerabilities to modify system files.
  • 15. Keylogger records everything the user types on his/her computer system to obtain passwords and other sensitive information and send them to the source of the keylogging program.
  • 16.  Thank You for any Queries contact on the given email id zunnunkhan@gmail.com
  翻译: