Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
29 views10 pages

Microproject of Nis

The document discusses various threats to network and information security, categorizing them into physical and non-physical threats. It details specific types of threats, including viruses, worms, Trojans, and insider threats, along with their definitions, effects, and prevention methods. The importance of identifying these threats to protect sensitive data and ensure system integrity is emphasized.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views10 pages

Microproject of Nis

The document discusses various threats to network and information security, categorizing them into physical and non-physical threats. It details specific types of threats, including viruses, worms, Trojans, and insider threats, along with their definitions, effects, and prevention methods. The importance of identifying these threats to protect sensitive data and ensure system integrity is emphasized.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

MICROPROJECT OF

NETWORK AND INFORMATION SECURITY (22620)

Submitted for partial fulfillment of the requirement for Diploma in

Computer Technology

2024-2025

TOPIC : Threats to Security

SUBMITTED BY :

1. GAURAV BRAMHE (08)


2. SAHIL BULBULE (09)
3. SUDHANSHU KALE (37)
4. KARAN GHATE (41)

HOD Name :
Mrs.P.S.Alur

Under the guidance of :


Mr. Nikhil Ambekar

Department of Computer Technology Priyadarshini Bhagwati college ( Diploma ) , Nagpur


THREATS TO SECURITY

1. Definition of a Security Threat

• A security threat is a risk that can potentially damage computer systems and organizations.
• Threats can be intentional, accidental, or caused by natural disasters.

2. Types of Security Threats

• Physical Threats – Includes theft, hardware damage, or infrastructure destruction


• Non-Physical Threats – Includes malware, hacking, and unauthorized access.

3. Potential Causes of Security Threats

• Intentional Attacks – Hacking, phishing, malware deployment.


• Accidental Threats – Human errors, software bugs, system misconfigurations.
• Natural Disasters – Earthquakes, floods, fires affecting hardware and data storage

4. Common Security Threats

• Viruses – Malicious programs that replicate and spread.


• Worms – Self-replicating malware that spreads without user intervention.
• Trojans – Malware disguised as legitimate software.
• Spyware – Secretly gathers user data.
• Ransomware – Encrypts data and demands payment for decryption.
• Phishing Attacks – Deceptive emails or websites used to steal sensitive information .
• Denial of Service (DoS) Attacks – Overloads systems to make them unavailable.
5. Importance of Identifying Threats
• Helps in implementing security measures.
• Protects sensitive data from unauthorized access.
• Ensures system integrity and prevents data loss.

Viruses

1. Definition
• A computer virus is a malicious program that replicates itself by modifying other
programs.
• It spreads by inserting copies of itself into executable files.

2. Effects of a Virus

• Deletes important data.


• Avoids detection by redirecting disk data.
• Triggers unwanted events (e.g., pop-ups).
• Steals private data like usernames and passwords.
• Displays annoying messages.
• Corrupts computer data.
• Logs keystrokes to steal information.
3. Common in Windows and Mac OS

• These operating systems are more widespread and lack strict file permissions.

4. Control & Prevention

• Use good backup procedures.


• Install reliable antivirus software.
• Keep software and systems updated.

Types of viruses

1. File Virus – Attaches to files, modifies program start, and executes unnoticed.

2. Boot Sector Virus – Infects the boot sector, runs before the OS loads, and spreads via
bootable media.

3. Macro Virus – Written in high-level languages like Visual Basic, spreads through macros
in documents.

4. Source Code Virus – Modifies source code to spread itself.

5. Polymorphic Virus – Changes its code each time it infects to avoid detection.
6. Encrypted Virus – Stays hidden in encrypted form and decrypts itself before execution.

7. Stealth Virus – Alters detection methods to remain hidden, making it hard to find.

8. Tunneling Virus – Bypasses antivirus by installing itself in system processes.

9. Multipartite Virus – Infects multiple system parts like boot sector, memory, and files.

10. Armored Virus – Uses tricks to avoid detection, like hiding its real location or
compressing itself.

11. Multiple Characteristic Virus – Has traits of different viruses, making it harder to
combat.

12. Retrovirus – Targets and disables antivirus software to prevent detection.

13. Overwrite Virus – Replaces file content with its own code, destroying data without
changing file size.

Phases of Computer Virus


1. Dormant Phase
• The virus stays inactive.
• It activates when triggered by an event (e.g., key press, specific date).
• Some viruses skip this phase.

2. Propagation Phase
• The virus starts spreading by making copies of itself.
• Each copy continues to multiply.

3. Triggering Phase
• The virus gets activated by a specific event (e.g., a certain number of
replications).

4. Execution Phase
• The virus performs its function.
• It may be harmful (deleting files) or harmless (showing pop-up messages).

Virus Elimination Steps


Virus Elimination Steps are :

1. Prevention
• Best way to deal with viruses, but complete prevention is difficult.
• Good backup procedures help control damage.

2. Detection
• Find where the virus is located.

3. Identification
• Identify the specific virus that has attacked.

4. Removal
• Remove all traces of the virus.
• Restore affected programs and files using antivirus software.

Worms
1. Definition
• A worm is self-replicating malware that spreads to other computers.
• Unlike a virus, it does not need a host program or human action to spread.

2. How It Works
• Uses automatic functions in an operating system.
• Often goes unnoticed until it slows down the system by consuming resources.

3. Effects of a Worm
• Installs backdoors for attackers.
• Slows down networks by using bandwidth.

4. Difference from a Virus


• A worm spreads between computers, while a virus infects programs within the same
system.
Torjan horse

1. Definition
• A Trojan horse is a hidden malicious program that allows an attacker to control a computer
remotely.
• It is disguised as useful software but installs harmful code once executed.

2. What It Can Do
• Crash or damage the computer.
• Steal sensitive data (passwords, credit card info).
• Modify user data.
• Perform unauthorized money transfers.
• Capture screenshots.
• Steal browsing history.

3. Working
• Can hide in a login screen and steal user IDs and passwords.
• Sends stolen information to the attacker without the user knowing.
• The attacker can then access the system using the stolen credentials.
Intruders

1. Definition
• An intruder is a person who tries to access a system without permission.

2. Purpose of Intrusion
• Gain unauthorized access.
• Damage the system.
• Disturb or steal data.

3. Security Violation
• Affects system availability.
• Compromises data integrity.
• Threatens data confidentiality.

4. Types of Intruders
• Can be an outsider or an authorized user misusing access.
Insider

1. Definition
• An insider is a person within an organization who launches security threats.
• Insider attacks come from employees, former employees, contractors, or business partners.

2. Types of Insider Threats


• Malicious Insiders – Intentionally harm the organization.
• Negligent Insiders – Make mistakes or ignore security policies, putting data at risk.
• Infiltrators – Outsiders who gain access to insider credentials without authorization.

3. Potential Risks
• Fraud and financial loss.
• Theft of confidential or valuable information.
• Disruption of security and operations.

You might also like