0% found this document useful (0 votes)
114 views9 pages

Presentation On Computer Threats

Computer threats can come from humans or natural disasters. Some common computer threats include worms, viruses, Trojans, spyware, riskware, and rootkits. Worms exploit operating system vulnerabilities to spread quickly from computer to computer. Viruses infect programs and gain control when files are opened. Trojans carry out unauthorized actions like deleting files or stealing information. Spyware collects user information without consent. Riskware includes potentially dangerous applications. Rootkits conceal malware to avoid detection.

Uploaded by

Kulbhushan Lakra
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views9 pages

Presentation On Computer Threats

Computer threats can come from humans or natural disasters. Some common computer threats include worms, viruses, Trojans, spyware, riskware, and rootkits. Worms exploit operating system vulnerabilities to spread quickly from computer to computer. Viruses infect programs and gain control when files are opened. Trojans carry out unauthorized actions like deleting files or stealing information. Spyware collects user information without consent. Riskware includes potentially dangerous applications. Rootkits conceal malware to avoid detection.

Uploaded by

Kulbhushan Lakra
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 9

COMPUTER THREATS

PREPARED BY :-
WO V.P SINGH
 The computer is a great tool to store important
information. In certain cases, the information is
very vital that losing it will harm the computer
system.
 Computer threats can come from many ways
either from human or natural disasters. For
example, when someone is stealing your account
information from a trusted bank, this threat
is considered as a human threat. However, when
your computer is soaked in heavy rain, then
that is a natural disaster threat
TYPES OF COMPUTER
THREATS
Worms

This malicious program category largely


exploits operating system vulnerabilities to
spread itself. The class was named for the way
the worms crawl from computer to computer,
using networks and e-mail. This feature gives
many worms a rather high speed in spreading
themselves.
Viruses
Programs that infected other programs,
adding their own code to them to gain control
of the infected files when they are opened.
This simple definition explains the
fundamental action performed by a virus -
infection.
Trojans
Programs that carry out unauthorized actions
on computers, such as deleting information
on drives, making the system hang, stealing
confidential information, etc. This class of
malicious program is not a virus in the
traditional sense of the word (meaning it does
not infect other computers or data). Trojans
cannot break into computers on their own
and are spread by hackers, who disguise
them as regular software. The damage that
they incur can exceed that done by traditional
virus attacks by several fold.
Spyware
Software that collects information about a
particular user or organization without their
knowledge. You might never guess that you
have spyware installed on your computer.
Riskware
Potentially dangerous applications include
software that has not malicious features but
could form part of the development
environment for malicious programs or could
be used by hackers as auxiliary components
for malicious programs.
Rootkits
Utilities used to conceal malicious activity. They
mask malicious programs to keep anti-virus
programs from detecting them. Rootkits modify
the operating system on the computer and alter
its basic functions to hide its own existence and
actions that the hacker undertakes on the
infected computer.

You might also like