Download Other Malware Threats To Data 30

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Carrier IQ wikipedia , lookup

Data Protection Act, 2012 wikipedia , lookup

Computer security wikipedia , lookup

Malware wikipedia , lookup

Hacker wikipedia , lookup

Mobile security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Information privacy law wikipedia , lookup

Data remanence wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
30 Threats To Data
30 Threats To Data
We’re now going to look at a range of
different threats to people’s data:
Opportunity Threats
Computer Viruses
Other Malware
Phishing
Accidental Damage
Hackers
30 Threats To Data
Opportunity Threats
• A company’s network security can be
breached by people who take a random
opportunity, such as an unattended PC
• Just lock the machine – CTRL/Alt/Del
30 Threats To Data
Viruses
• Viruses are malicious programs designed
to replicate and spread across a
computer or a network to damage or
corrupt files & data
• So be clear: a virus is a program
30 Threats To Data
Other Malware
Good
Bad
Benign
Malign
Malicious
30 Threats To Data
Other Malware
• Malware is the general name for several
other types of malicious software
• Examples are Trojans, worms, adware
and spyware
• These are all nasty kinds of software that
aims to cause damage to files or to steal
data
30 Threats To Data
Phishing
• Means when criminals use fake emails or
fake websites
• They trick people into clicking links and
then entering their personal data, such
as bank passwords
• The cyber-criminals then obtain money
by fraud and identify theft.
30 Threats To Data
Phishing
3 Fake site also looks real so
people enter personal
details & click Submit
2
Some fooled so they open
fake emails & click links
4
Criminal now has personal
details eg bank password
1
Send masses of fake emails
30 Threats To Data
Accidental Damage
30 Threats To Data
Accidental Damage
• So accidental damage can be cause by
natural disasters, such as freak weather
causing a flood or an earthquake
• But accidents can also happen that
affect the data
• For example, an untrained user could
delete important files
30 Threats To Data
Hackers
• People who try to gain unauthorised
access to a computer or a network.
• A high proportion of hackers are people
who actually work for an organisation
• But there are many different types
• Some hackers just do it for the challenge
of breaking through security
• But there are also cyber-criminals…
30 Threats To Data
Hackers
• Intercept packets
• Called ‘packet sniffing’
• Can collect passwords etc
30 Threats To Data
Hackers
That’s why it’s called ‘drive by’ hacking!
So home networks need password that’s strong
30 Threats To Data
Hackers
Harm Computer
eg Delete files
Get Personal Details
eg Passwords
Program
Malicious Software
Malware
Cyber Criminals
30 Threats To Data
30 Threats To Data