Professional Documents
Culture Documents
Presentation By
Maaz Muhammad Anwar Ali
(BW437515)
THREA
T
3
HOW DO YOU
NOTICE ?
, 4
, 5
HACKER
S
A person who
uses
computers to
gain
unauthorized
access to data
6
VIRUSE
S
A piece of code
which is capable
of copying itself
and typically has
a detrimental
effect, such as
corrupting the
system or
destroying data
7
COMPUTER
CRASHES
A serious computer
failure. A computer crash
means that the
computer itself stops
working or that a
program aborts
unexpectedly
, 8
SAFE
COMPUTING
METHODS
YOU MAY
• USE PRE RUN
CHECKUPS
• REINITIALIZE SYSTEM
• REINSTALL
NO ! APPLICATIONS
• REFORMAT HARD DISK
VIRUS • OBSERVE OPERATION
TIMINGS
• LOG DISK SPACE
• LOG BAD SECTORS
9
CONCLUSIO
N
10
1.2 ATTACKS
22
Types of Threats
•In an
interruptio
n, an asset
of the
system
becomes
lost,
unavailable
,
or
unusable. 23
24
Vulnerabilities
26
Software Vulnerabilities
Software Deletion
Software Modification
Software Theft
Hardware Vulnerabilities
29