MICROPROJECT OF
NETWORK AND INFORMATION SECURITY (22620)
Submitted for partial fulfillment of the requirement for Diploma in
Computer Technology
2024-2025
TOPIC : Threats to Security
SUBMITTED BY :
1. GAURAV BRAMHE (08)
2. SAHIL BULBULE (09)
3. SUDHANSHU KALE (37)
4. KARAN GHATE (41)
HOD Name :
Mrs.P.S.Alur
Under the guidance of :
Mr. Nikhil Ambekar
Department of Computer Technology Priyadarshini Bhagwati college ( Diploma ) , Nagpur
THREATS TO SECURITY
1. Definition of a Security Threat
• A security threat is a risk that can potentially damage computer systems and organizations.
• Threats can be intentional, accidental, or caused by natural disasters.
2. Types of Security Threats
• Physical Threats – Includes theft, hardware damage, or infrastructure destruction
• Non-Physical Threats – Includes malware, hacking, and unauthorized access.
3. Potential Causes of Security Threats
• Intentional Attacks – Hacking, phishing, malware deployment.
• Accidental Threats – Human errors, software bugs, system misconfigurations.
• Natural Disasters – Earthquakes, floods, fires affecting hardware and data storage
4. Common Security Threats
• Viruses – Malicious programs that replicate and spread.
• Worms – Self-replicating malware that spreads without user intervention.
• Trojans – Malware disguised as legitimate software.
• Spyware – Secretly gathers user data.
• Ransomware – Encrypts data and demands payment for decryption.
• Phishing Attacks – Deceptive emails or websites used to steal sensitive information .
• Denial of Service (DoS) Attacks – Overloads systems to make them unavailable.
5. Importance of Identifying Threats
• Helps in implementing security measures.
• Protects sensitive data from unauthorized access.
• Ensures system integrity and prevents data loss.
Viruses
1. Definition
• A computer virus is a malicious program that replicates itself by modifying other
programs.
• It spreads by inserting copies of itself into executable files.
2. Effects of a Virus
• Deletes important data.
• Avoids detection by redirecting disk data.
• Triggers unwanted events (e.g., pop-ups).
• Steals private data like usernames and passwords.
• Displays annoying messages.
• Corrupts computer data.
• Logs keystrokes to steal information.
3. Common in Windows and Mac OS
• These operating systems are more widespread and lack strict file permissions.
4. Control & Prevention
• Use good backup procedures.
• Install reliable antivirus software.
• Keep software and systems updated.
Types of viruses
1. File Virus – Attaches to files, modifies program start, and executes unnoticed.
2. Boot Sector Virus – Infects the boot sector, runs before the OS loads, and spreads via
bootable media.
3. Macro Virus – Written in high-level languages like Visual Basic, spreads through macros
in documents.
4. Source Code Virus – Modifies source code to spread itself.
5. Polymorphic Virus – Changes its code each time it infects to avoid detection.
6. Encrypted Virus – Stays hidden in encrypted form and decrypts itself before execution.
7. Stealth Virus – Alters detection methods to remain hidden, making it hard to find.
8. Tunneling Virus – Bypasses antivirus by installing itself in system processes.
9. Multipartite Virus – Infects multiple system parts like boot sector, memory, and files.
10. Armored Virus – Uses tricks to avoid detection, like hiding its real location or
compressing itself.
11. Multiple Characteristic Virus – Has traits of different viruses, making it harder to
combat.
12. Retrovirus – Targets and disables antivirus software to prevent detection.
13. Overwrite Virus – Replaces file content with its own code, destroying data without
changing file size.
Phases of Computer Virus
1. Dormant Phase
• The virus stays inactive.
• It activates when triggered by an event (e.g., key press, specific date).
• Some viruses skip this phase.
2. Propagation Phase
• The virus starts spreading by making copies of itself.
• Each copy continues to multiply.
3. Triggering Phase
• The virus gets activated by a specific event (e.g., a certain number of
replications).
4. Execution Phase
• The virus performs its function.
• It may be harmful (deleting files) or harmless (showing pop-up messages).
Virus Elimination Steps
Virus Elimination Steps are :
1. Prevention
• Best way to deal with viruses, but complete prevention is difficult.
• Good backup procedures help control damage.
2. Detection
• Find where the virus is located.
3. Identification
• Identify the specific virus that has attacked.
4. Removal
• Remove all traces of the virus.
• Restore affected programs and files using antivirus software.
Worms
1. Definition
• A worm is self-replicating malware that spreads to other computers.
• Unlike a virus, it does not need a host program or human action to spread.
2. How It Works
• Uses automatic functions in an operating system.
• Often goes unnoticed until it slows down the system by consuming resources.
3. Effects of a Worm
• Installs backdoors for attackers.
• Slows down networks by using bandwidth.
4. Difference from a Virus
• A worm spreads between computers, while a virus infects programs within the same
system.
Torjan horse
1. Definition
• A Trojan horse is a hidden malicious program that allows an attacker to control a computer
remotely.
• It is disguised as useful software but installs harmful code once executed.
2. What It Can Do
• Crash or damage the computer.
• Steal sensitive data (passwords, credit card info).
• Modify user data.
• Perform unauthorized money transfers.
• Capture screenshots.
• Steal browsing history.
3. Working
• Can hide in a login screen and steal user IDs and passwords.
• Sends stolen information to the attacker without the user knowing.
• The attacker can then access the system using the stolen credentials.
Intruders
1. Definition
• An intruder is a person who tries to access a system without permission.
2. Purpose of Intrusion
• Gain unauthorized access.
• Damage the system.
• Disturb or steal data.
3. Security Violation
• Affects system availability.
• Compromises data integrity.
• Threatens data confidentiality.
4. Types of Intruders
• Can be an outsider or an authorized user misusing access.
Insider
1. Definition
• An insider is a person within an organization who launches security threats.
• Insider attacks come from employees, former employees, contractors, or business partners.
2. Types of Insider Threats
• Malicious Insiders – Intentionally harm the organization.
• Negligent Insiders – Make mistakes or ignore security policies, putting data at risk.
• Infiltrators – Outsiders who gain access to insider credentials without authorization.
3. Potential Risks
• Fraud and financial loss.
• Theft of confidential or valuable information.
• Disruption of security and operations.