Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
12 views12 pages

Project Presentation

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views12 pages

Project Presentation

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

THREATS TO

DATA
BY B.NISHITA
WHAT IS A THREAT?
A Threat is a potential violation of security.
When a threat is actually executed, it
becomes attack.
COMON THREATS
Some comon threats are as follows:
Viruses : 1. Worms 2. Trojans
Spyware
Adware
Spamming
PC Intrusion : 1. Denial of service
2.Sweeping 3. Password
Guessing
Phishing
COMPUTER VIRUSES
Computer Viruses are malicious codes/programs that cause damage to
data and files on a system.

WORMS : A Worm is a self-replicating program which eats up the


entire disk space or memory.

TROJAN HORSES : A Trojan horse is a program that apears harmless but


actually performs malicious functions such as deleting or damaging files.
DAMAGE CAUSED BY VIRUSES
DAMAGE OR DELETE FILES : Some viruses
may delete or damage random documents or
specific files that are crucial to your
operating system-for example : operating
system files.
SLOW DOWN YOUR COMPUTER : Viruses
can run in the background, without being
seen, and may cause your computer to run
extremely slowly.
INVADE YOUR EMAIL PROGRAM : Some
forms of viruses may wreak even more havoc
by spreading themselves to the contacts in
your address book.
SPYWARE
SPYWARE is a software which is mostly installed on your
computer without your consent, to spy on your activities and
report this data to people willing to pay for it.
These are used to spy o some one either for legal or illegal
purpose.
DAMAGE CAUSED BY SPYWARE
COMPROMISES YOUR DATA, COMPUTING HABITS, AND
IDENTITY : Spyware can monitor information about your
computing habits, such as what websites you visit, or record
your keystrokes , which in the end can lead to identity theft.

ALTERS PC SETTINGS : Some forms of spyware can also


alter computer settings like your web browser home page
setting or the placement of your desktop icons.

SLOWS DOWN YOUR PC : Spyware can rob your PC or


system speed and internet access efficiency.
ADWARE
These are the programs that deliver unwanted
ads to your computer.
Adware is similar to spyware-however, it
may be installed with your consent.
DAMAGE CAUSED BY ADWARE
ADWARE TRACKS INFORMATION JUST LIKE
SPYWARE : Adware tracks information about
your data and computing habits to produce
targeted advertising, such as pop-up ads, on
your computer screen.
DISPLAYS ARRAYS OF ANNOYING
ADVERTISING : When infected with adware,
you will likely see frequent pop-up ads
appear out of nowhere.
SLOWS DOWN YOUR PC : The adware
software working in the background and the
bombardment of ads can slow your PC to a
crawl.
SPAMMING
SPAMMING refers to the sending of
bulk-mail by an identified or
unidentified source.

In many malicious form, the attacker


keeps on sending bulk mail until the
mail-server runs out of disk space.
DAMAGE CAUSED BY SPAMMING
SPAM REDUCES PRODUCTIVITY : The billions of spam messages
circulating across the internet can disrupt email delivery, degrade
system performance, and reduce overall productivity.

SPAM EATS UP YOUR TIME : Deleting spam emails seems like the
simple solution, but it eats up a significant amount of productivity.

SPAM CAN LEAD TO WORSE THINGS : Spam messages may


contain offensive or fradulent material and can even be used to
spread viruses.
THANK YOU

You might also like