Threats to a computer

rameshsidh5 6,283 views 29 slides Jan 04, 2015
Slide 1
Slide 1 of 29
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29

About This Presentation

for itt ca student


Slide Content

THE INSTITUTE OF CHARTERED A C COUNTANTS OF INDIA DEEPIKA SONI IPCC REG. NO. CRO - 0456452 BATCH COMMENCEMENT DATE: 23-January-2013 PROJECT TOPIC: THREATS TO A COMPUTER SUBMITTED BY: ITT CENTRE NAME: BIKANER BRANCH OF CIRC OF ICAI 1

BIKANER BRANCH OF CIRC OF ICAI C-I 009 BATCH NO.: Bikaner-1/13/68 CA. SHREE BALLABH BAGRI MISS SONALI JAIN BRANCH CHAIRMAN FACULTY MEMBER THE INSTITUTE OF CHARTERED A C COUNTANTS OF INDIA 2

This Is To Certify That DEEPIKA SONI Has Under Taken A Project On “THREAT TO A COMPUTER” After Going Through The Report, We Wish To Record Our Satisfaction & Commend To DEEPIKA SONI For The Effort Put In By Their In This Exercise. CERTIFICATE CA. SHREE BALLABH BAGRI MISS SONALI JAIN BRANCH CHAIRMAN FACULTY MEMBER 3

SUBMITTED BY RANJEET SINGH BRAR UNDER THE GUIDANCE OF MISS SONALI JAIN (I.T.T. FACULTY) Submitted In Partial Fulfillment For The I.T. Training Conducted By Bikaner Branch Of I.C.A.I For The Course Of I.P.C.C. BATCH NO. BIKANER-1/13/68 REG. NO. BKN/2012-13/1358 THREATS TO A COMPUTER THE INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA 4

Acknowledgement While coming on acknowledgement, it seems to me closing of long chapter of reminiscences which bloomed and gloomed at BRANCH CHAIRMEN CA. SHREE BALLABH BAGRI , BIKANER BRANCH OF CIRC OF ICAI, BIKANER. This is my proud privilege to express my sincere and deep sense of gratitude my faculty member Ms. SONALI JAIN for inspiration guidance, persistent involvement, scholarly suggestion and constructive critical supervision throughout the pursuit of present study. And finally many thanks to all those friends who kept company and who directly or indirectly helped me in the completing of this project work. RANJEET SINGH BRAR 5

Hardware requirements Software Requirement DVD(DIGITAL VIDEO DISK ) Mouse Microsoft Office2010 Monitor Keyboard DEEPIKA SONI , 6 SYSTEM REQUIREMENTS Operating System = Window7 Minimum Hard Disk = 80GB RAM = 4GB

INDEX INTRODUCTION 9 TYPES OF VIRUSES AND WORMS 10 SYMPTOMS 14 COMPONENTS 16 HACKER 20 HOW NOTICED 25 SUGGESTIONS 26 PREVENTIONS 31 CONCLUSIONS 33 REFERENCES 36 DEEPIKA SONI , 7

INDEX DEEPIKA SONI , 8

THREAT ANYTIHNG THAT MAY DAMAGE, HURT OR LOSS IS CALLED THREAT. DEEPIKA SONI , 9

HOW DO YOU NOTICE ? PROGRAMS TAKE LONGER TO LOAD. PROGRAMS ACCESS MULTIPLE DISK DRIVES. UNUSUAL AND FREQUENT ACCESS TO DISK. DISK SPACE DECREASES RAPIDLY. BAD DISK SECTORS STEADILY INCREASE. RAM DECREASES SUDDENLY OR STEADILY. COMPUTER HALTS WITH OR WITHOUT FUNNY MESSAGES. DEEPIKA SONI , 10

DEEPIKA SONI , 11

A person who uses computers to gain unauthorized access to data HACKERS DEEPIKA SONI , 12

VIRUSES A piece of code which is capable of copying itself and typically has A detrimental effect, such as corrupting the system or destroying data DEEPIKA SONI , 13

 A serious computer failure. A  computer crash means  that the computer itself stops working or that a program aborts unexpectedly COMPUTER CRASHES DEEPIKA SONI , 14

In a computer, a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. WORMS DEEPIKA SONI , 15

 Pop-ups on your computer when you use your internet browser  POP-UPS DEEPIKA SONI , 16

LOST DATA DEEPIKA SONI , 17

WHAT TO DO ? DEEPIKA SONI , 18

SAFE COMPUTING METHODS NO ! VIRUS DEEPIKA SONI , 19

CONCLUSION DEEPIKA SONI , 20

REFERENCES DEEPIKA SONI , 21

22 1.2 ATTACKS Threats, Vulnerabilities, and Controls Attacking Hardware, Software, and Data A vulnerability is a weakness in the security system, for example, in procedures, design, or implementation, that might be exploited to cause loss or harm. A threat to a computing system is a set of circumstances that has the potential to cause loss or harm. A threat is blocked by control of a vulnerability .

23 • In an interruption , an asset of the system becomes lost, unavailable, or unusable. • If an unauthorized party not only accesses but tampers with an asset, the threat is a modification . • Finally, an unauthorized party might create a fabrication of counterfeit objects on a computing system. Types of Threats • An interception means that some unauthorized party has gained access to an asset.

24

26 Vulnerabilities

27 Hardware Vulnerabilities deliberate attacks on equipment, intending to limit availability, usually involve theft or destruction.

29 Software Vulnerabilities Software Deletion Software Modification Other categories of software modification include • a Trojan horse: a program that overtly does one thing while covertly doing another • a virus: a specific type of Trojan horse that can be used to spread its “infection” from one computer to another • a trapdoor: a program that has a secret entry point • information leaks in a program: code that makes information accessible to unauthorized people or programs Software Theft
Tags