Академический Документы
Профессиональный Документы
Культура Документы
Threat
An action or event that might compromise security. A threat is a violation of security.
Vulnerability
Existence of weakness, design or implementation error that can lead into an unexpected or undesired event compromising the security of the system.
Attack
An attack is any action that violates security.
Exploit
A defined way to breach the security of any computer system or network through its vulnerabilities. 3
SECURITY
A state of well-being of information and infrastructure in which the possibility of successful yet undetected theft, tampering and disruption of information is kept low or intolerable.
HACKING
5
Refers to the person who enjoys learning the details of the computer systems to stretch his/her capabilities. Cracker Refers to a person who uses hacking skills for offensive purpose. Ethical Hacker Refers to the security professional who uses hacking for defensive purposes.
Worm
Spamming mails
Phishing
Worm
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
10
MALWARE
Malware, short for malicious software, is software to help hackers disrupt users computer operation, gather sensitive information, or gain unauthorized access to a computer system. While it is often software, it can also appear in the form of script or code. 'Malware' is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or code.
11
12
SPYWARE
Spyware is a type of malware (malicious software) installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Spyware is often secretly installed on a user's PC without their knowledge.
However, some spyware such as keyloggers may be installed by the owner of a shared, corporate, or PC on purpose in order to intentionally monitor users.
13
Trojan Trojan horses are impostorsfiles that claim to be something desirable but, in fact, are malicious. A very important distinction between Trojan horse programs and true viruses is that they do not replicate themselves. Trojan horses contain malicious code that when triggered cause loss, or even theft, of data. For a Trojan horse to spread, you must invite these programs onto your computers; for example, by opening an email attachment or downloading and running a file from the Internet. Trojan Vundo is a Trojan horse.
14
15
COOKIE
A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is usually a small piece of data sent from a website and stored in a user's web browser while a user is browsing a website. When the user browses the same website in the future, the data stored in the cookie can be retrieved by the website to notify the website of the user's previous activity. Although cookies cannot carry viruses, and cannot install malware on the host computer, tracking cookies and especially third-party tracking cookies are commonly used as ways to compile longterm records of individuals' browsing histories a major privacy concern that has prompted European and US law makers to take action.
16
Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email. Definitions of spam usually include the aspects that email is unsolicited and sent in bulk. Botnets, networks of virus-infected computers, are used to send about 80% of spam.
Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications
Spam
Phishing
17
18
19
20
FIREWALL
A firewall can either be software-based or hardware-based and is used to help keep a network secure. Firewalls are used to protect computer networks from hostile intrusions.
22
23
24
THANK YOU!
25