0% found this document useful (0 votes)
183 views3 pages

Threats To Computer System & Control Measures

Viruses, hacking, phishing, spyware, spam, and firewalls pose threats to computer systems. Viruses are malicious programs that infect computers through email attachments or downloads. Hacking involves gaining unauthorized access by exploiting security weaknesses. Phishing uses fake emails and websites to steal personal information. Spyware collects private information secretly. Spam is unsolicited junk mail that can contain malware. A firewall monitors network traffic and protects internal networks based on security rules.

Uploaded by

Abhishek Sinha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
183 views3 pages

Threats To Computer System & Control Measures

Viruses, hacking, phishing, spyware, spam, and firewalls pose threats to computer systems. Viruses are malicious programs that infect computers through email attachments or downloads. Hacking involves gaining unauthorized access by exploiting security weaknesses. Phishing uses fake emails and websites to steal personal information. Spyware collects private information secretly. Spam is unsolicited junk mail that can contain malware. A firewall monitors network traffic and protects internal networks based on security rules.

Uploaded by

Abhishek Sinha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

THREATS TO COMPUTER SYSTEM & CONTROL MEASURES

Concept of Threat
Virus
 Malicious computer programs that are often sent as an email
attachment or a download with the intent of infecting your
computer, as well as the computers of everyone in your contact
list. Just visiting a site can start an automatic download of a
virus.
 When a program is running, the virus attached to it could
infiltrate your hard drive and also spread to USB keys and
external hard drives. Any attachment you create using this
program and send to someone else could also infect them with
the virus.
 The homepage you set on your web browser is different (note
that this could be caused by Adware that has been installed on
your computer).
 Programs are running without your control.
 If you suspect a problem, make sure your security software is up
to date and run it to check for infection. If nothing is found, or if
you are unsure of what to do, seek technical help.
Hacking
 Hacking is a term used to describe actions taken by someone to
gain unauthorized access to a computer. The availability of
information online on the tools, techniques, and malware makes
it easier for even non-technical people to undertake malicious
activities.
 The process by which cyber criminals gain access to your
computer.
 Find weaknesses (or pre-existing bugs) in your security settings
and exploit them in order to access your information.
 Install a Trojan horse, providing a back door for hackers to enter
and search for your information.
Phishing

 Phishing is used most often by cyber criminals because it's easy to


execute and can produce the results they're looking for with very
little effort.
 Fake emails, text messages and websites created to look like they're
from authentic companies. They're sent by criminals to steal
personal and financial information from you. This is also known as
“spoofing”.
 Trick you into giving them information by asking you to update,
validate or confirm your account. It is often presented in a manner
than seems official and intimidating, to encourage you to take
action.
 Provides cyber criminals with your username and passwords so that
they can access your accounts (your online bank account, shopping
accounts, etc.) and steal your credit card numbers.

Spyware

 Software that collects personal information about you without you


knowing.
 They often come in the form of a ‘free' download and are installed
automatically with or without your consent. These are difficult to
remove and can infect your computer with viruses.
 Send your usernames, passwords, surfing habits, list of applications
you've downloaded, settings, and even the version of your
operating system to third parties.
 Take you to unwanted sites or inundate you with uncontrollable
pop-up ads.

Spam

 Spam is one of the more common methods of both sending


information out and collecting it from unsuspecting people.
 The mass distribution of unsolicited messages, advertising or
pornography to addresses which can be easily found on the
Internet through things like social networking sites, company
websites and personal blogs.
 Annoy you with unwanted junk mail.
 Provide a vehicle for malware, scams, fraud and threats to your
privacy.

Firewall

 Firewall is a network security device, either hardware or software


based, which monitors all incoming and outgoing traffic and based
on defined set of security rules it accepts, reject or drop that
specific traffic.
 Firewall establishes a barrier between secured internal networks
and outside untrusted network, such as Internet.

You might also like