You are on page 1of 34

SECURI

TY
THREAT
S
Presentation
Our
team Amna
Malik
Fatima
Ashraf
Hassan
Nawaz
Muhammad
Ali
Muhammad
Raffi
Sulman
Ahmad
Today’s Agenda

Security Threat
1

Types of Security
Threat 2

What is
malware? 3
cont…

Types of
Malwares 4

Denial of Service
(DoS) 5

TYPES OF DOS
ATTACKS 6
cont…

Password
attacks 7
How to protect
yourself from
security threats 8

Conclusion
9
0
1
Security
Threat
Means any threat or
connected series of threats
to commit an intentional
attack against a Computer
System for the purpose of
demanding money,
securities or other tangible
or intangible property of
value from an Insured.
0
Types of Security
2Threat
The Following are some of the most common types of security threats:

Malware Denial of Password


Service (DoS) attacks

01 02 03
03 What is malware?
Malware, or “malicious software,” is an umbrella term that describes
any malicious program or code that is harmful to systems.

0 Types of Malwares
4 Trojan
Worms Horse

01 02 03
Viruses
1. Wor
ms
These are self-replicating
malware that attaches to
different files and searches
for ways to spread to other
computers, such as through
shared network storage
How Worm infected
systems?
● They are usually infected on a
system via the Internet or shared
network storage. Unlike viruses,
worms do not require a host
program to run and can
propagate on their own.
● It often damages systems and
reduces network performance,
and can spread quickly once it
infects a host
2.
Viruses
Among the different types of
malware, the most common
type of malware is a computer
virus.
The term “Virus” stands for “Vital Information Resources under
Siege” and refers to malicious software that can harm your data, files,
and programs by replicating itself.

What is Computer
Virus?
These are a type of malware that attach themselves to legitimate files and
programs, spreading to other computers through shared network connections
or removable storage devices.
How does a Computer Virus
work?
● A computer virus is a form of malware that infects a legitimate
file and spreads when that file is shared or executed by another
user. The malicious code within the file can cause harm to the
system and potentially spread to other systems through shared
files or infected applications or software.
● The malicious code within the virus can range from harmless to
harmful, potentially modifying or deleting data on a computer.
Cont….
● Activation of a virus typically occurs when
an infected file is opened, at which point the
virus may infect other programs on the
computer.
● It’s important to be aware of the potential
risks and take precautions to protect your
computer from becoming infected with a
virus.
3. Trojan horses
They are malware masquerading as legitimate programs,
tricking users into installing and running them on their
systems.

It carries out malicious operations under the appearance of


a desired operation such as playing an online game.
How do trojan horses affect the computer
system/network?

A Trojan enables attackers to gain unauthorized access to the


device, perform key logging, steal sensitive information, and even
control the device remotely.
Example of trojan horses:

● Emotet malware:
Which was first identified in 2014 and continues to target
victims’ financial information, even after a global effort to
dismantle it in 2021.
Key Difference between Trojan Horses and VIRUS

A Trojan horse differs from a virus in that it attaches itself to non-


executable files, such as images and audio files, rather than
executable files
05
Denial of Service
(DoS)
DOS ATTACK
DOS Attack is a malicious attempt by a single person or a
group of people to cause the victim, site or node to deny
service to it customers.

DoS = when a single host attacks

DDoS = when multiple hosts attack simultaneously


IDEA OF DOS
ATTACK
● Purpose is to shut down a site, not penetrate it.
● Purpose may be vandalism, extortion or social
action(including terrorism) (Sports betting sites often
extorted)
● Modification of internal data, change of programs
(Includes defacement of websites)
06
TYPES OF DOS
ATTACKS
Penetration Eavesdropp
ing

Man-In-The- Flooding
Middle
1. Penetration 2. Eavesdropping
Attacker gets inside your Attacker gains access to
machine same network

(Can take over machine and Listens to traffic going in and


do whatever he wants) out of your machine
3. Man-in-the- 4. Flooding
Middle
Attacker listens to output and Attacker sends an
controls output overwhelming number of
messages at your machine;
Can substitute messages in
great congestion
both directions
0
7
Password attacks
● Password attacks are a type of
cyber attack that targets user
passwords in order to gain
unauthorized access to online
accounts or systems.
● Password attacks can take
many forms, but the basic idea
is to try to guess or steal a
user's password in order to gain
access to their account.
Types of password
attacks
● Brute force attacks:
An attacker tries every possible combination of characters
in order to guess a user's password.
● Dictionary attacks:
An attacker uses a list of common passwords or words in
an attempt to guess a user's password.
● Phishing attacks:
An attacker uses a fake website or email to trick a user
into entering their password.
This is a form of social engineering, where the attacker
tries to manipulate the user into revealing their password.
0
8
How to
protect
yourself from
security
threats
There are several steps you can take to protect
yourself from security threats:

● Keep your software and devices up-to-date: Software and devices are
regularly updated to patch security vulnerabilities. Make sure to install updates
as soon as they become available.
● Use strong passwords: Use unique, complex passwords for
each account and enable two-factor authentication whenever possible.
Continue….
● Be cautious of suspicious emails and links:
Phishing emails often contain links to malicious
websites. Be cautious of any emails or links from
unknown senders or that contain suspicious
content.
● Use antivirus and anti-malware software:
Antivirus and anti-malware software can help
protect your computer and devices from
malicious software.
Cont….
● Avoid using public Wi-Fi: Public Wi-Fi
networks can be insecure, making it easier
for attackers to intercept your data. Use a
virtual private network (VPN) or mobile
hotspot instead.
● Backup your data: Regularly backup your
data to an external hard drive or cloud
storage provider in case of data loss or
ransomware attacks.
Cont….
● Educate yourself and others: Stay informed
about the latest security threats and best
practices for staying safe online. Educate
others, especially children and elderly
relatives, about online security risks and how
to stay safe.

By following these tips and regularly


practicing good security habits, you can greatly
reduce your risk of falling victim to security
threats.
0
9
Conclusion:
● Security threats are a serious
concern in today's digital age.
● These threats can cause a wide
range of damages, from financial loss
and data theft to reputational damage
and operational disruptions
● By taking these steps, individuals
and organizations can reduce the risk
of security breaches and protect
themselves and their assets from the
damaging consequences of cyber
attacks.
thanks
Do you have any
questions?

You might also like