it seminar on threats

Upload: vedant-agarwal

Post on 07-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 It Seminar on Threats

    1/16

    Srishti Agrawal

    SYBBA

  • 8/3/2019 It Seminar on Threats

    2/16

    o Introductiono What is an information security threat?

    o Information security threats

    o Internet security threatso Most common threats, consequences and

    protection

    o Top 10 threats

    o Conclusion

  • 8/3/2019 It Seminar on Threats

    3/16

    Information security means protectinginformation and information system fromunauthorized access, use, disclosure ,disruption , modification or destruction

    Computer security is a branch of technologyknown as information security as applied tocomputers.

  • 8/3/2019 It Seminar on Threats

    4/16

    A threat is any circumstance or event with thepotential to harm an information systemthrough unauthorized access, destruction,disclosure, modification of data, and denial

    of service.

    Threats can be :

    -Natural or human

    -Deliberate or Accidental

  • 8/3/2019 It Seminar on Threats

    5/16

    People or employees Low awareness for information security

    aspects

    Advancing the IT infrastructure ,networkingand distributive working

    Improvement of complexity and effectivenessof hackers and viruses

    Electronic mail Fire, flood , earthquake

  • 8/3/2019 It Seminar on Threats

    6/16

  • 8/3/2019 It Seminar on Threats

    7/16

    Malware threat

  • 8/3/2019 It Seminar on Threats

    8/16

    Malware is software designed to destroy,steal private information or spy on acomputer system without the consent of theuser.

    Malwares malicious codes , maliciousprograms or malicious software.

    The most popular categories are Trojan

    horses, viruses, spywares, spams , worms .

  • 8/3/2019 It Seminar on Threats

    9/16

    Stolen user ID or passwords Unauthorized access to confidential

    information

    Loss of intellectual property Remote control of companys PC

    Theft of customer data

    Reduced network performance and bandwidth

    Increased internet traffic and changes tobrowser home pages and search engines

  • 8/3/2019 It Seminar on Threats

    10/16

    Good user education is vital in fightingagainst malwares

    Keep your operating system up to date byinstalling OS security fixes and programpatches

    Use firewall protection

    Install anti-spywares software's

    Monitor logs for unusual traffics

  • 8/3/2019 It Seminar on Threats

    11/16

  • 8/3/2019 It Seminar on Threats

    12/16

  • 8/3/2019 It Seminar on Threats

    13/16

    Ensure you are addressing the right personprior to sending email

    Beware of emails from unknown parties

    Do not open unsolicited emails

    Never respond to unsolicited emails

    Do not click on links on unsolicited e-mails

  • 8/3/2019 It Seminar on Threats

    14/16

    Suspicious attachments must NOT be openede.g. Executable files

    Regularly purge unnecessary emails to freestorage space

    Do not open or reply to spam messages

    Avoid registering unnecessarily to mailinglists

    Use properly configured and regularlyupdated spam filter, antivirus andantispyware software

  • 8/3/2019 It Seminar on Threats

    15/16

    1. Spam mail2. Phishing mail3. Wireless attack4. Hacker attack

    5. Web exploits6. Adware7. Viruses

    8. Spyware9. Identity theft10. Social engineering

  • 8/3/2019 It Seminar on Threats

    16/16