Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
30 Threats To Data 30 Threats To Data We’re now going to look at a range of different threats to people’s data: Opportunity Threats Computer Viruses Other Malware Phishing Accidental Damage Hackers 30 Threats To Data Opportunity Threats • A company’s network security can be breached by people who take a random opportunity, such as an unattended PC • Just lock the machine – CTRL/Alt/Del 30 Threats To Data Viruses • Viruses are malicious programs designed to replicate and spread across a computer or a network to damage or corrupt files & data • So be clear: a virus is a program 30 Threats To Data Other Malware Good Bad Benign Malign Malicious 30 Threats To Data Other Malware • Malware is the general name for several other types of malicious software • Examples are Trojans, worms, adware and spyware • These are all nasty kinds of software that aims to cause damage to files or to steal data 30 Threats To Data Phishing • Means when criminals use fake emails or fake websites • They trick people into clicking links and then entering their personal data, such as bank passwords • The cyber-criminals then obtain money by fraud and identify theft. 30 Threats To Data Phishing 3 Fake site also looks real so people enter personal details & click Submit 2 Some fooled so they open fake emails & click links 4 Criminal now has personal details eg bank password 1 Send masses of fake emails 30 Threats To Data Accidental Damage 30 Threats To Data Accidental Damage • So accidental damage can be cause by natural disasters, such as freak weather causing a flood or an earthquake • But accidents can also happen that affect the data • For example, an untrained user could delete important files 30 Threats To Data Hackers • People who try to gain unauthorised access to a computer or a network. • A high proportion of hackers are people who actually work for an organisation • But there are many different types • Some hackers just do it for the challenge of breaking through security • But there are also cyber-criminals… 30 Threats To Data Hackers • Intercept packets • Called ‘packet sniffing’ • Can collect passwords etc 30 Threats To Data Hackers That’s why it’s called ‘drive by’ hacking! So home networks need password that’s strong 30 Threats To Data Hackers Harm Computer eg Delete files Get Personal Details eg Passwords Program Malicious Software Malware Cyber Criminals 30 Threats To Data 30 Threats To Data