You are on page 1of 15

THREATS TO HARDWARE

Presentation By
Maaz Muhammad Anwar Ali
(BW437515)
THREA
T

ANYTIHNG THAT MAY


DAMAGE, HURT OR LOSS IS
CALLED THREAT.

3
HOW DO YOU
NOTICE ?

 PROGRAMS TAKE LONGER TO LOAD.


 PROGRAMS ACCESS MULTIPLE DISK DRIVES.
 RAM DECREASES SUDDENLY OR STEADILY.
 DISK SPACE DECREASES RAPIDLY.
 BAD DISK SECTORS STEADILY INCREASE.

, 4
, 5
HACKER
S

A person who
uses
computers to
gain
unauthorized
access to data

6
VIRUSE
S
A piece of code
which is capable
of copying itself
and typically has
a detrimental
effect, such as
corrupting the
system or
destroying data
7
COMPUTER
CRASHES

A serious computer
failure. A computer crash
means that the
computer itself stops
working or that a
program aborts
unexpectedly

, 8
SAFE
COMPUTING
METHODS
YOU MAY
• USE PRE RUN
CHECKUPS
• REINITIALIZE SYSTEM
• REINSTALL
NO ! APPLICATIONS
• REFORMAT HARD DISK
VIRUS • OBSERVE OPERATION
TIMINGS
• LOG DISK SPACE
• LOG BAD SECTORS

9
CONCLUSIO
N

10
1.2 ATTACKS

Attacking Hardware, Software, and Data

Threats, Vulnerabilities, and Controls

A vulnerability is a weakness in the security system, for


example, in procedures, design, or implementation, that might be
exploited to cause loss or harm.

A threat to a computing system is a set of


circumstances that has the potential to cause loss or
harm.

A threat is blocked by control of a vulnerability.

22
Types of Threats

• An interception means that some unauthorized party has gained


access to
an asset.

•In an
interruptio
n, an asset
of the
system
becomes
lost,
unavailable
,
or
unusable. 23
24
Vulnerabilities

26
Software Vulnerabilities

Software Deletion

Software Modification

Other categories of software modification include


• a Trojan horse: a program that overtly does one thing while
covertly doing another
• a virus: a specific type of Trojan horse that can be used to
spread its “infection” from one computer to another
• a trapdoor: a program that has a secret entry point
• information leaks in a program: code that makes
information
accessible to unauthorized people or programs

Software Theft
Hardware Vulnerabilities
29

You might also like