3
Most read
7
Most read
10
Most read
THREATS TO INFORMATION SYSTEMS Presented By: Nimisha Walecha MBA( Gen) Roll No. E13
Threats to information systems Hardware failure Fire Software failure Electrical problems Personnel actions  User errors Access penetration, program changes Theft of data, services, equipment Telecommunications problems
What is a Computer Virus? A software program Difficult to detect Spreads rapidly Destroys data Disrupts processing & memory Can ONLY catch a virus by running a program All computer viruses are man-made
 
 
There are viruses that can simply display annoying messages on your computer screen and go away. On the other hand, there are viruses that can cause real harm to your computer by wiping out all information on your hard drive or changing all your file extensions. Viruses are becoming more prevalent because they can spread rapidly around the world by the click of a mouse.
Basic virus terminology Worm Special type of virus that can replicate itself and use memory, but cannot attach itself to other programs.  Uses computer networks to replicate itself. Trojan Horse A computer program that installs malicious software  under the guise of doing something else. Trojan Horses do not reproduce automatically.
 
 
Spyware Spyware is a small program or piece of code that is secretly installed on your computer and designed to “spy” on your online activity and/or personal information. It also interferes with user control of the computer in other ways, such as installing additional software, redirecting  Web browser  activity etc. Symptoms- Your computer is  running much slower than usual .  Your computer takes a lot longer to boot up than it used to. You see a lot of activity on your network connection.
Adware (Spyware’s close cousin) Adware tracks your browsing habits, the type of ads you click on, bookmarks you make and other similar online activities.  Because adware’s purpose is designed to get you to perform an action, it is much easier to recognize than spyware.   Symptoms- Pop-up ads that won’t quit.  A hijacked browser home page. Search results that make no sense - Clicking on the links here will install spyware on your PC.
 
Other computer viruses Concept, Melissa:  Word documents, e-mail. Deletes files Form: Makes clicking sound, corrupts data Explore.exe:  Attached to e-mail, tries to e-mail to others, destroys files Monkey:  Windows won’t run Chernobyl:  Erases hard drive, ROM bios JUNKIE:  Infects files, boot sector, memory conflicts
Antivirus software Software to detect viruses Eliminate viruses Advanced versions run in memory to protect processing, guard against viruses on disks, and on incoming network files All major anti-virus software includes an “e-mail scan” feature that will check your e-mail attachments for viruses before you open the attachments.
SECURITY AND THE INTERNET ENCRYPTION:  Coding & scrambling messages to deny unauthorized access AUTHENTICATION:  Ability to identify another party
SECURITY AND THE INTERNET PUBLIC KEY ENCRYPTION SENDER SCRAMBLED MESSAGE RECIPIENT Encrypt  with public key Decrypt  with private key
Principles of a Simple Cryptography Substitution THIS IS A SECRET (key n=3) WKLV LV D VHFUHW Transposition THIS IS A SECRET (key 4213) IHSTSI S EAERTC
  Caesar Cipher ABCDEFGHIJKLMNOPQRSTUVWXYZ Rotate 13 points NOPQRSTUVWXYZABCDEFGHIJKLM
THE GOTHS COMETH  (Plaintext) (n=13) GUR TAFUE PAYRFU  ( Ciphertext )
Rotating Key Cipher ABCDEFGHIJKLMNOPQR S TUVWXYZ BCDEFGHIJKLMNOPQRS T UVWXYZA CDEFGHIJKLMNOPQRST U VWXYZAB DEFGHIJKLMNOPQRSTU V WXYZABC EFGHIJKLMNOPQRSTUV W XYZABCD FGHIJKLMNOPQRSTUVW X YZABCDE GHIJKLMNOPQRSTUVWX Y ZABCDEF HIJKLMNOPQRSTUVWXY Z ABCD...
General Principles Longer keys make better ciphers Random keys make better ciphers Good ciphers produce “random” ciphertext Best keys are used once and thrown away
THANK YOU

More Related Content

PDF
Test plan
PPT
Internet ppt
PPTX
Software Configuration Management (SCM)
PDF
HR SWOT Analysis: Introduce effective HR Management
PDF
An Introduction: Technology, Ethics, and the Workplace
PPTX
Model of information retrieval (3)
PPTX
Insight into SOAR
PPTX
World trade center new york
Test plan
Internet ppt
Software Configuration Management (SCM)
HR SWOT Analysis: Introduce effective HR Management
An Introduction: Technology, Ethics, and the Workplace
Model of information retrieval (3)
Insight into SOAR
World trade center new york

What's hot (20)

PPTX
Threats to information security
PPT
Keyloggers and Spywares
PPTX
Virus and worms
PPTX
Cyber security and cyber laws
PPTX
malware analysis
PPTX
Cyber Security in Society
PPT
IT System & Security Audit
PPTX
Cyber Security
PPTX
Mis model
PPTX
Computer misuse and criminal law
PPT
System vulnerability and abuse
PPT
Security and Control.ppt
PPTX
IT General Controls
PPTX
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
PPTX
Introduction to information system
PPT
INFORMATION TECHNOLOGY FOR BUSINESS
PPT
Web Server Hardware and Software
PPTX
Protection of critical information infrastructure
PPTX
Information risk management
PPT
Introduction to Information Security
Threats to information security
Keyloggers and Spywares
Virus and worms
Cyber security and cyber laws
malware analysis
Cyber Security in Society
IT System & Security Audit
Cyber Security
Mis model
Computer misuse and criminal law
System vulnerability and abuse
Security and Control.ppt
IT General Controls
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Introduction to information system
INFORMATION TECHNOLOGY FOR BUSINESS
Web Server Hardware and Software
Protection of critical information infrastructure
Information risk management
Introduction to Information Security
Ad

Viewers also liked (20)

PPTX
Centura Design & Print Solutions, Inc.
PDF
Modulul 1 it
PPT
Powerpont for film cover
PPTX
Victoria asplund ieso
PPT
Presentation : Amazing Indian Creativity
PPTX
Trabajo electiva universidad mariana
PPT
A Brief History of the Information Lifecycle Landscape
PDF
Google Apps: 4 ROI cases studies
PPT
Social Media in a Corporate Context Manchester 2010 - Robin Grant, We Are Social
DOC
Robots
PDF
Communicate magazine - Stephen Pain
PDF
Communicate magazine - Neel Bradham
PPTX
Skype & 1000 heads
PPT
Chris Taylor, Future plc, Strategic Thought
PPT
Learning center
PPTX
Powerpoint fotografía s
DOC
Television
PPTX
Debates foro humanismo tercero A
PPTX
5 básico
PPS
Arrowdawn Offshore Europe 2009 Presentation
Centura Design & Print Solutions, Inc.
Modulul 1 it
Powerpont for film cover
Victoria asplund ieso
Presentation : Amazing Indian Creativity
Trabajo electiva universidad mariana
A Brief History of the Information Lifecycle Landscape
Google Apps: 4 ROI cases studies
Social Media in a Corporate Context Manchester 2010 - Robin Grant, We Are Social
Robots
Communicate magazine - Stephen Pain
Communicate magazine - Neel Bradham
Skype & 1000 heads
Chris Taylor, Future plc, Strategic Thought
Learning center
Powerpoint fotografía s
Television
Debates foro humanismo tercero A
5 básico
Arrowdawn Offshore Europe 2009 Presentation
Ad

Similar to Threats to an information system (20)

PPTX
Introduction to Computer Virus
PPTX
Computer virus
PPTX
Computer Viruses
PPTX
CSC103 Digital Security
PPTX
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
PPTX
viruses.pptx
PPTX
Harmful software
PPTX
computer virus ppt.pptx
PPTX
Computer Viruses
PPTX
Computer virus
PPT
Itc lec 15 Computer security risks
PPT
PPT
Viruses
PPTX
Computervirus
PPTX
SECURITY THREATS AND SAFETY MEASURES
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
PPTX
Ch. 3 computer virus
PPT
viruses
PPTX
MALWARE AND ITS TYPES
PDF
What are Computer Viruses.pdf
Introduction to Computer Virus
Computer virus
Computer Viruses
CSC103 Digital Security
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
viruses.pptx
Harmful software
computer virus ppt.pptx
Computer Viruses
Computer virus
Itc lec 15 Computer security risks
Viruses
Computervirus
SECURITY THREATS AND SAFETY MEASURES
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Ch. 3 computer virus
viruses
MALWARE AND ITS TYPES
What are Computer Viruses.pdf

Threats to an information system

  • 1. THREATS TO INFORMATION SYSTEMS Presented By: Nimisha Walecha MBA( Gen) Roll No. E13
  • 2. Threats to information systems Hardware failure Fire Software failure Electrical problems Personnel actions User errors Access penetration, program changes Theft of data, services, equipment Telecommunications problems
  • 3. What is a Computer Virus? A software program Difficult to detect Spreads rapidly Destroys data Disrupts processing & memory Can ONLY catch a virus by running a program All computer viruses are man-made
  • 4.  
  • 5.  
  • 6. There are viruses that can simply display annoying messages on your computer screen and go away. On the other hand, there are viruses that can cause real harm to your computer by wiping out all information on your hard drive or changing all your file extensions. Viruses are becoming more prevalent because they can spread rapidly around the world by the click of a mouse.
  • 7. Basic virus terminology Worm Special type of virus that can replicate itself and use memory, but cannot attach itself to other programs. Uses computer networks to replicate itself. Trojan Horse A computer program that installs malicious software under the guise of doing something else. Trojan Horses do not reproduce automatically.
  • 8.  
  • 9.  
  • 10. Spyware Spyware is a small program or piece of code that is secretly installed on your computer and designed to “spy” on your online activity and/or personal information. It also interferes with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity etc. Symptoms- Your computer is running much slower than usual . Your computer takes a lot longer to boot up than it used to. You see a lot of activity on your network connection.
  • 11. Adware (Spyware’s close cousin) Adware tracks your browsing habits, the type of ads you click on, bookmarks you make and other similar online activities. Because adware’s purpose is designed to get you to perform an action, it is much easier to recognize than spyware.   Symptoms- Pop-up ads that won’t quit. A hijacked browser home page. Search results that make no sense - Clicking on the links here will install spyware on your PC.
  • 12.  
  • 13. Other computer viruses Concept, Melissa: Word documents, e-mail. Deletes files Form: Makes clicking sound, corrupts data Explore.exe: Attached to e-mail, tries to e-mail to others, destroys files Monkey: Windows won’t run Chernobyl: Erases hard drive, ROM bios JUNKIE: Infects files, boot sector, memory conflicts
  • 14. Antivirus software Software to detect viruses Eliminate viruses Advanced versions run in memory to protect processing, guard against viruses on disks, and on incoming network files All major anti-virus software includes an “e-mail scan” feature that will check your e-mail attachments for viruses before you open the attachments.
  • 15. SECURITY AND THE INTERNET ENCRYPTION: Coding & scrambling messages to deny unauthorized access AUTHENTICATION: Ability to identify another party
  • 16. SECURITY AND THE INTERNET PUBLIC KEY ENCRYPTION SENDER SCRAMBLED MESSAGE RECIPIENT Encrypt with public key Decrypt with private key
  • 17. Principles of a Simple Cryptography Substitution THIS IS A SECRET (key n=3) WKLV LV D VHFUHW Transposition THIS IS A SECRET (key 4213) IHSTSI S EAERTC
  • 18. Caesar Cipher ABCDEFGHIJKLMNOPQRSTUVWXYZ Rotate 13 points NOPQRSTUVWXYZABCDEFGHIJKLM
  • 19. THE GOTHS COMETH (Plaintext) (n=13) GUR TAFUE PAYRFU ( Ciphertext )
  • 20. Rotating Key Cipher ABCDEFGHIJKLMNOPQR S TUVWXYZ BCDEFGHIJKLMNOPQRS T UVWXYZA CDEFGHIJKLMNOPQRST U VWXYZAB DEFGHIJKLMNOPQRSTU V WXYZABC EFGHIJKLMNOPQRSTUV W XYZABCD FGHIJKLMNOPQRSTUVW X YZABCDE GHIJKLMNOPQRSTUVWX Y ZABCDEF HIJKLMNOPQRSTUVWXY Z ABCD...
  • 21. General Principles Longer keys make better ciphers Random keys make better ciphers Good ciphers produce “random” ciphertext Best keys are used once and thrown away