it seminar on threats
TRANSCRIPT
-
8/3/2019 It Seminar on Threats
1/16
Srishti Agrawal
SYBBA
-
8/3/2019 It Seminar on Threats
2/16
o Introductiono What is an information security threat?
o Information security threats
o Internet security threatso Most common threats, consequences and
protection
o Top 10 threats
o Conclusion
-
8/3/2019 It Seminar on Threats
3/16
Information security means protectinginformation and information system fromunauthorized access, use, disclosure ,disruption , modification or destruction
Computer security is a branch of technologyknown as information security as applied tocomputers.
-
8/3/2019 It Seminar on Threats
4/16
A threat is any circumstance or event with thepotential to harm an information systemthrough unauthorized access, destruction,disclosure, modification of data, and denial
of service.
Threats can be :
-Natural or human
-Deliberate or Accidental
-
8/3/2019 It Seminar on Threats
5/16
People or employees Low awareness for information security
aspects
Advancing the IT infrastructure ,networkingand distributive working
Improvement of complexity and effectivenessof hackers and viruses
Electronic mail Fire, flood , earthquake
-
8/3/2019 It Seminar on Threats
6/16
-
8/3/2019 It Seminar on Threats
7/16
Malware threat
-
8/3/2019 It Seminar on Threats
8/16
Malware is software designed to destroy,steal private information or spy on acomputer system without the consent of theuser.
Malwares malicious codes , maliciousprograms or malicious software.
The most popular categories are Trojan
horses, viruses, spywares, spams , worms .
-
8/3/2019 It Seminar on Threats
9/16
Stolen user ID or passwords Unauthorized access to confidential
information
Loss of intellectual property Remote control of companys PC
Theft of customer data
Reduced network performance and bandwidth
Increased internet traffic and changes tobrowser home pages and search engines
-
8/3/2019 It Seminar on Threats
10/16
Good user education is vital in fightingagainst malwares
Keep your operating system up to date byinstalling OS security fixes and programpatches
Use firewall protection
Install anti-spywares software's
Monitor logs for unusual traffics
-
8/3/2019 It Seminar on Threats
11/16
-
8/3/2019 It Seminar on Threats
12/16
-
8/3/2019 It Seminar on Threats
13/16
Ensure you are addressing the right personprior to sending email
Beware of emails from unknown parties
Do not open unsolicited emails
Never respond to unsolicited emails
Do not click on links on unsolicited e-mails
-
8/3/2019 It Seminar on Threats
14/16
Suspicious attachments must NOT be openede.g. Executable files
Regularly purge unnecessary emails to freestorage space
Do not open or reply to spam messages
Avoid registering unnecessarily to mailinglists
Use properly configured and regularlyupdated spam filter, antivirus andantispyware software
-
8/3/2019 It Seminar on Threats
15/16
1. Spam mail2. Phishing mail3. Wireless attack4. Hacker attack
5. Web exploits6. Adware7. Viruses
8. Spyware9. Identity theft10. Social engineering
-
8/3/2019 It Seminar on Threats
16/16