0% found this document useful (0 votes)
420 views16 pages

Computer Security Threats

This document discusses various types of computer security threats. It identifies intentional threats such as hackers and malicious code like viruses. It also discusses accidental threats such as errors and omissions that can create vulnerabilities. Specific threats covered include fraud, theft, employee sabotage, loss of infrastructure, industrial espionage, and threats to personal privacy. Common forms of malicious code like viruses, worms, and Trojan horses are also explained.

Uploaded by

Dahayat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
420 views16 pages

Computer Security Threats

This document discusses various types of computer security threats. It identifies intentional threats such as hackers and malicious code like viruses. It also discusses accidental threats such as errors and omissions that can create vulnerabilities. Specific threats covered include fraud, theft, employee sabotage, loss of infrastructure, industrial espionage, and threats to personal privacy. Common forms of malicious code like viruses, worms, and Trojan horses are also explained.

Uploaded by

Dahayat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Computer

Security Threats
By Michael Ramos
Introduction
 What are Computer security threats?
 Various types of threats
 Conclusion
What is a Computer Security
Threat
 In Computer Security a threat is a possible
danger that might exploit a vulnerability to
breach security and thus cause possible
harm.
 A threat can be either
 Intentional (an individual cracker or a criminal
organization)
 Accidental (the possibility of a computer
malfunctioning, or the possibility of a natural
disaster such as an earthquake, a fire, or
a tornado) or otherwise a circumstance,
capability, action, or event
Errors and Omissions
 Errors are caused not only by data entry clerks
processing hundreds of transactions per day, but also
by all types of users who create and edit data.
 Many programs, especially those designed by users
for personal computers, lack quality control
measures.
 Users, data entry clerks, system operators, and
programmers frequently make errors that contribute
directly or indirectly to security problems. In some
cases, the error is the threat, such as a data entry
error or a programming error that crashes a system.
In other cases, the errors create vulnerabilities. Errors
can occur during all phases of the systems life cycle.
Fraud and Theft
 Computer systems can be exploited for both
fraud and theft both by automating
traditional methods of fraud and by using
new methods.
 For example, individuals may use a computer to
skim small amounts of money from a large
number of financial accounts, assuming that
small discrepancies may not be investigated.
 Computer fraud and theft can be committed
by insiders or outsiders. Insiders are responsible
for the majority of fraud.
Employee Sabotage
 Common examples of computer-related
employee sabotage include:
 destroying hardware or facilities,
 planting logic bombs that destroy
 programs or data
 entering data incorrectly,
 "crashing" systems
 deleting data,
 holding data hostage and changing data
Malicious Hackers
 Malicious hackers, sometimes called crackers,
refers to those who break into computers
without authorization. They can include both
outsiders and insiders.
 The hacker threat should be considered in
terms of past and potential future damage.
Although current losses due to hacker attacks
are significantly smaller than losses due to
insider theft and sabotage, the hacker
problem is widespread and serious.
Loss of Physical and
Infrastructure Support
 The loss of supporting infrastructure
includes power failures (outages, spikes,
and brownouts), loss of communications,
water outages and leaks, sewer problems,
lack of transportation services, fire, flood,
civil unrest, and strikes.
Industrial Espionage
 Industrial espionage is the act of gathering
proprietary data from private companies or the
government for the purpose of aiding another
companies.
 Industrial espionage can be perpetrated either by
companies seeking to improve their competitive
advantage or by governments seeking to aid their
domestic industries.
 Since information is processed and stored on
computer systems, computer security can help
protect against such threats; it can do little,
however, to reduce the threat of authorized
employees selling that information.
Malicious Code
 Malicious code refers to viruses, worms,
Trojan horses, logic bombs, and other
"uninvited" software.
 Actual costs attributed to the presence of
malicious code have resulted primarily
from system outages and staff time
involved in repairing the systems.
Nonetheless, these costs can be
significant.
Virus
 A code segment that replicates by attaching
copies of itself to existing executables. The
new copy of the virus is executed when a user
executes the new host program.
 The virus may include an additional "payload"
that triggers when specific conditions are
met.
 For example, some viruses display a text string
on a particular date. There are many types of
viruses, including variants, overwriting, resident,
stealth, and polymorphic.
Trojan Horse
A program that performs a desired task,
but that also includes unexpected and
undesirable function.
 Example an editing program for a multiuser
system. This program could be modified to
randomly delete one of the users' files each
time they perform a useful function such as
editing, but the deletions are unexpected
and definitely undesired!
Worm
A self-replicating program that is self-
contained and does not require a host
program.
 The program creates a copy of itself and
causes it to execute; no user intervention
is required. Worms commonly use network
services to propagate to other host
systems.
Threats to Personal Privacy
 The accumulation of vast amounts of
electronic information about individuals
by governments, credit bureaus, and
private companies, combined with the
ability of computers to monitor, process,
and aggregate large amounts of
information about individuals have
created a threat to individual privacy.
Conclusion
 What are Computer security threats?
 Various types of threats
References
 Guttman, Barbara, and Edward Roback. An
Introduction to Computer Security the NIST
Handbook. Gaithersburg, MD: U.S. Dept. of
Commerce, Technology Administration,
National Institute of Standards and
Technology, 1995. Print.
 Wikipedia. Wikimedia Foundation, 17 Nov.
2013. Web. 03 Dec. 2013.
 Panko, R. R. Corporate Computer and
Network Security. Upper Saddle River, NJ:
Pearson Prentice Hall, C2004., n.d. Print.

You might also like