You are on page 1of 17

Security Threats

Computer Security threats are relentlessly inventive. Master of


disguise and manipulation, these threat constantly evolve to find
new ways to annoy, steal and harm. Arm yourself with information
and resources to safeguard against complex and growing
computer security threats and stay safe online.
Spyware Threats
A Serious computer threats, spyware is any program that monitors your online
activities or install programs your programs with out your consent for profit or to
capture personal information. We’ve amassed a wealth of knowledge that will
help you combat spyware threats and stay safe online.
Hackers And Predators
• People, not computers, create computer security threats and
malware. Hackers and predators are programmers who
victimize others for their own gain by breaking into computer
system to steal, change or destroy information as a form of
cyber terrorism . What scams are they using lately? Learn
how to combat dangerous malware and safe online.
Phishing Threats
Masquerading as a trustworthy person or business, phishers attempt to steal sensitive
financial or personal information through fraudulent email or instant messages.

The most common threats faced by organization information systems can be


placed into following categories:
 Accidents
 Inaccurate data entry
 Attempts to tasks beyond the ability of the employee
 Failure of carryout backup procedure
 Natural Disasters
 Theft
 Unauthorized use
 Computer Viruses
Reducing Threat To Information Systems
Types of Controls
 Physical Protection
 Biometric Controls
 Telecommunication Control
 Auditing
CYBER LAW IN INDIA
Cyber Law is another important law introduced recently covering a
wide variety of legal issues relating to information and communication
technology. It includes use of internet as well as other form of computer
or Digital Processing Devices(DPD), which also cover and includes
intellectual property, privacy, Freedom of expression and Jurisdiction.
Important Feature of The
IT Act
 The Scope of the Act extends to whole of India
 It sours electronic records and digital signatures
 It encourage the electronic governance
 The Act protect the right intellectual property owners
 It encourage E-commerce or E- Business for its qualitative and quick
functioning
 It is regulate the cyber contraventions and cyber crime
 It protect the types of offences like Tampering, Hacking, Publishing of
information which is obscene in electronic form

You might also like