Upload
surender-dhuran-prajapat
View
225
Download
0
Embed Size (px)
Citation preview
7/28/2019 system security ppt.pptx
1/26
7/28/2019 system security ppt.pptx
2/26
Now a days , there are so many unethicalpractices in the form of digital attacks whichare causing problems in the form of
Information Technology . These attacks aresometimes in the form of malicious softwarewhich enter in the system by themselveswithout the knowledge of user and sometimesin the form of an unauthorized user who getthe access to computer system for damagingthe stored data , to steal information or to
keep the eyes on the activities of computer .Some of the common forms of digital attacksare: Computer Virus , Spam , Phishing ,Spyware , Adware , Hacking , Cracking , etc.
7/28/2019 system security ppt.pptx
3/26
MALWARE
Malware stands for MaliciousSoftware . It is a general term used torefer any kind of digital attacks onthe computer system .It is a kind ofunwanted software which is stored in
your system by someone else toperform malicious functions .
7/28/2019 system security ppt.pptx
4/26
Malware can be divided intonumber of different categories
which include :Computer Virus
Spam
AdwareSpyware
Worm
Trojan HorseLogic Bomb
7/28/2019 system security ppt.pptx
5/26
Computer VirusComputer viruses are in fact the malicious
programs having the ability to replicate andexecute themselves . They can attachingthemselves to the other programs , files or data
stored in the system automatically without anyinstructions from the user . It can enter into theother computer by different means like when youcopy some data from an infected system to another
system or it can come to your system as an e-mailmessage . Once entered into the system itautomatically attaches itself to the system files of
your computer .
7/28/2019 system security ppt.pptx
6/26
TYPES OF COMPUTER VIRUSBased upon their work , computer viruses
can be of different types:Worm
Trojan
BombBased upon their target infection it is ofvarious types:
Boot VirusProgram Virus
Macro Virus
Stealth Virus
7/28/2019 system security ppt.pptx
7/26
WORMThese are very sophisticated viruses with
the ability to spread very quickly . Normally,these viruses does not cause any harm to the
system , but they just keep on replicating
themselves to the discs used in the system orthrough network they keep on spreading to
the other systems . They reduce the storage
space and available memory of the system ,e.g. , Scalper , Morris Worms .
7/28/2019 system security ppt.pptx
8/26
TROJANTrojans are those destructive programs that
hide its intention as they appear to be theuseful utilities . These types of viruses oftencome to you as e-mail attachments with
fascinating names forcing you to open them .They start deleting files in the system . Theyspread by copying to the other systems ,
e.g. , Backdoor .
7/28/2019 system security ppt.pptx
9/26
BOMBThese types of viruses remain inactive and
undeleted in the system for a long time andwait for a specific event or date to trigger . For
example , Israeli Virus or Friday 13th Virus
waits for Friday the 13th , and deletes theprogram files on that day .Saturday 14th ,
Tuesday the 13th, etc. are the other examples.
7/28/2019 system security ppt.pptx
10/26
BOOT VIRUSThese types of viruses infect the Master
Boot Record {MBR} of the hard disc driveor DOS boot record {DBR} of the floppydisc . Every time a system is booted with
an infected hard disc or floppy disc ,these viruses become active and startinfecting the stored data . Danish boot ,
PC stone , Joshi are the examples of bootvirus .
7/28/2019 system security ppt.pptx
11/26
PROGRAM VIRUSAlso known as the Parasitic viruses , they infect
the program files of your system having extensionname as .COM , .EXE , .SYS , .OVL , .DLL , .SCR ,etc . These viruses do not affect the boot recordsof the system . Program files are their attractivetargets because these files are used veryfrequently and moreover the format of these filesis quite simple . So , when these programs are
used they become active in the memory ofcomputer and start its destruction work .
7/28/2019 system security ppt.pptx
12/26
MACRO VIRUSThe main target area of these categories of viruses
is to infect the data of your system . Whenever youwork with the applications like MS-Word , MS-EXCEL , etc . You save some important data in the
shape of files . These type of viruses destroy thedata stored by you causing irrecoverable damagesometimes .They can easily spread from onecomputer to another on the network or throughinternet as most of the time data files aretransferred from one system to another . Melissa,Bloodhound , etc .are the examples of macro virus
.
7/28/2019 system security ppt.pptx
13/26
STEALTH VIRUSThese types of viruses have the capability to
change their appearance by changing theircodes . This way , they can hide theirexistence from the virus scanner programs .
Sometimes , it hides the increased size of filedue to virus infection causing the file to bescanned as an infected file . Frodo , Brain are
the examples of stealth virus .
7/28/2019 system security ppt.pptx
14/26
HOW THE VIRUS SPREAD ?Viruses programs are created in such a way that
they can easily replicate itself once entered in thecomputer system as soon as an infected program isexecuted , the virus code is executed first and startscreating its copies to the other programs or bootrecords . Sometimes they stay inside the memoryof computer till it is switched off and sometimes itstays active till the infected application running .
They spread through storage media , networks andinternet . When the system is switched off , thevirus vanishes the memory but resides in the
infected area .
7/28/2019 system security ppt.pptx
15/26
Effects Of Virus ON Your SystemThe available memory of the system decreased
drastically .The working speed of the system gets slower .
Unusual messages or characters started
appearing on the screen .Data file damaged or corrupted showing unusual
characters or symbols in place of actual data .
Sometimes even the whole hard disc getreformatted .
7/28/2019 system security ppt.pptx
16/26
Preventive Measures
From VirusIt is rightly said that Prevention is
better than cure . So , it is alwaysbetter to take the preventive measures
to safeguard your system from any
type of virus attack .
7/28/2019 system security ppt.pptx
17/26
PREVENTIVE MEASURESAvoid the use of external or unknown discs
and if required , scan the disc properly withsome good antivirus software .
While working with your e-mail account ,
do not open the unknown mails .Before downloading any file or program
from the internet make it sure that thesource that you are using is reliable one.
Never install the pirated software in your
system .
7/28/2019 system security ppt.pptx
18/26
Install an effective Antivirus software in
your system and update it periodically .
If your system is connected on a local areanetwork , then restrict the access to your
computer and allow only the genuine users to
use the system resource .Always keep a backup copy of your data files .
7/28/2019 system security ppt.pptx
19/26
ANTIVIRUS SOFTWAREAnti Virus software are the utilities which prevent
the viruses to enter in your system . They can alsodetect and remove the virus entered in your system .These are the memory resident programs andactivated as soon as the system is started . It checksall the files in the system and in case any virus isdetected , it removes the virus . It is very importantto keep your Anti Virus software updated with the
definitions of new viruses . Some popular Anti Virussoftware are :
Norton Anti Virus from Symantec
McAfee
7/28/2019 system security ppt.pptx
20/26
SPYWAREThese are the kind of software , downloaded
on your computer without your knowledge totrack your activities and to report the sameto the people who are ready to pay for it .
They can also be used to collect personalinformation of someone for the purpose ofidentity theft or fraud .Normally they collect
the information like : e-mail address ,passwords , credit card umbers , web pagesvisited , etc .
7/28/2019 system security ppt.pptx
21/26
SPAMSSpam are the unwanted messages which
are forcefully sent to a large number ofpeople who otherwise do not want toreceive these messages . The most commoform of spam is unwanted electronic junk
mails in which a single message is sentto individual users with direct addresses. In these mails services and products are
promoted by various companies . Most ofthe time these are annoying butharmless . However , sometimes these areused for identify theft or another fraud .
ADWARE
7/28/2019 system security ppt.pptx
22/26
ADWAREThese are the programs , which deliver
unwanted aids in he form of pop-ups toyour computer . While browsing theinternet these pop-ups start downloading
by themselves to your computer and thisway they eats up the band width of yourinternet connection . Due to the non-availability of sufficient band width thebrowsing becomes slower and yourrequired pages take more time to appearin the web browser .
PHISHING
7/28/2019 system security ppt.pptx
23/26
PHISHINGIt is one of the fraudulent process to acquiresome secret information from the user likecredit card number , net banking passwords ,account data , etc . with the help of anauthentic looking e-mail or website . For
example , you may receive an e-mail fromyour bank asking you to update yourinformation regarding your user ID andpassword of your net banking account . The
mail which appears to be genuine one sentby the bank collects the sensitive informationand sends it to fraudulent people who may
use it later for some cyber crime .
7/28/2019 system security ppt.pptx
24/26
HACKERS
A Hacker is a person who possesses high level of
computer skills and having good knowledge of the
machine and operating system . He attempts to
gain access on a remote computer for which heis not authorized for the purpose of corrupting or
stealing data in that system . But the main aimof the hacking is to know the details of the
system and how do they work . CRACKERS
7/28/2019 system security ppt.pptx
25/26
CRACKERSA Cracker is a person who is expert in
breaking the security of a system ornetwork to steal important informationwithout the concept of the other
person . Because of this , they are alsoknown as cyber burglars . As theirintention is always to cause damage o
the other users they are considered tobe more dangerous them the hackers .
7/28/2019 system security ppt.pptx
26/26
FIREWALLSThese can be the hardware or softwarewhich protects a system , network orserver from the virus or hackers attack .
It acts like a traffic cop , allowing ordisallowing access to a computer ornetwork or based on the predefined
rules .