Report Group 2
Report Group 2
Report Group 2
• Program Threats
• System Threats
Different Threats to System Security
Program Threats:
A program was written by a cracker to hijack the
security or to change the behavior of a normal process.
System Threats:
These threats involve the abuse of system services
and strive to create a situation in which operating-system
resources and user files are misused.
Different Threats to System Security
1. Virus
2. Trojan Horse
3. Trap Door
4. Logic Bomb
5. Worm
Different Threats to System Security
Virus
An infamous threat, known most widely. It is a self-
replicating and malicious thread that attaches itself to a
system file and then rapidly replicates itself, modifying
and destroying essential files leading to a system
breakdown.
Different Threats to System Security
Trojan Horse
A code segment that misuses its environment is
called a Trojan Horse. They seem to be attractive and
harmless cover programs but are really harmful hidden
programs that can be used as the virus carrier.
Different Threats to System Security
Trap Door
The designer of a program or system might leave a
hole in the software that only he is capable of using.
Logic Bomb
A program that initiates a security attack only under
a specific situation.
Different Threats to System Security
Worm
A computer worm is a type of malware that
replicates itself and infects other computers while
remaining active on affected systems
Different Threats to System Security
1. Worm
2. Port Scanning
3. Denial of Service
Different Threats to System Security
Worm
An infection program that spreads through
networks. Unlike a virus, they target mainly LANs. The
worm spawns copies of itself, using up a majority of
system resources and also locking out all other
processes.
Different Threats to System Security
Port Scanning
It is a means by which the cracker identifies the
vulnerabilities of the system to attack. It is an automated
process that involves creating a TCP/IP connection to a
specific port.
Different Threats to System Security
Denial of Service
Such attacks aren’t aimed for the purpose of
collecting information or destroying system files. Rather,
they are used for disrupting the legitimate use of a
system or facility.
Different Threats to System Security
Network Security
It safeguard computer networks from unauthorized
access and ensuring the confidentiality, integrity, and
availability of data transmitted over the network. It
involves a combination of hardware and software
measures to prevent unauthorized access and protect
against network-based attacks.
How to secure a System
Firewall
Firewalls act as a barrier between internal networks
and external networks, monitoring and controlling
incoming and outgoing network traffic based on
predetermined security rules.
How to secure a System
Network Segmentation
It means dividing a network into smaller, isolated
segments, organizations can limit the potential impact of
a security breach. This segmentation helps prevent
unauthorized access to sensitive data and reduces the
risk of lateral movement by attackers within the network.
How to secure a System
Endpoint Security
Endpoint security focuses on protecting individual
devices, such as desktops, laptops, smartphones, and
tablets, from security threats.
How to secure a System
• Anti-virus
• Endpoint encryption
How to secure a System
Anti-virus
Antivirus software is one of the fundamental
components of endpoint security. It helps detect and
remove malware infections, protecting devices from
malicious software that can compromise data and system
integrity.
How to secure a System
Endpoint Encryption
Endpoint encryption is another crucial measure in
endpoint security. It ensures that sensitive data stored on
devices is encrypted, making it unreadable to
unauthorized individuals even if the device is lost or
stolen.
How to secure a System
Application Security
Application security focuses on ensuring that
software applications are designed, developed, and
deployed securely.
How to secure a System
Cloud Security
Cloud security refers to the measures and
technologies used to protect cloud-based infrastructure,
applications, and data from unauthorized access, data
breaches, and other security risks.
How to secure a System
2. Encryption
Encryption
By encrypting data before it is stored or transmitted
in the cloud, organizations can ensure the confidentiality
and integrity of their information.
How to secure a System
Authentication
Authentication is the process of verifying the
identity of an individual or system attempting to access a
computer system or network. It involves mechanisms
such as usernames and passwords, biometrics, and
multi-factor authentication to ensure that only
authorized users can access the system.
How to secure a System
Authorization
Authorization determines the actions, privileges,
and resources that an authenticated user or system is
allowed to access or perform within a computer system.
It involves defining access controls and permissions
based on user roles, responsibilities, and the principle of
least privilege to prevent unauthorized activities.
How to secure a System
Encryption
It is the process of converting data into an
unreadable form to protect it from unauthorized access
or disclosure. It uses cryptographic algorithms and keys
to scramble data, making it unreadable unless decrypted
with the appropriate key.
Common Security Threats today
and how to prevent them
Phishing
Phishing is a common yet dangerous cyber threat
because it can be high-tech or no-tech. In these attacks,
criminals pose as legitimate entities to exploit users' trust,
curiosity, greed, or kindness. They send fake emails to entice
their targets to provide information such as passwords,
social security numbers, or bank account information.
Common Security Threats today
and how to prevent them
Social Engineering
Some of the costliest cyber threats in history have
been social engineering attacks. These attacks involve
criminals exploiting human psychology rather than
technical vulnerabilities to trick people into providing
them with sensitive information or access to data,
networks and systems.
Common Security Threats today
and how to prevent them
Malware
Malware is short for malicious software. As the
name hints, these are a type of computer programs that
are designed to cause damage to a computer system,
network, or device.
Common Security Threats today
and how to prevent them
Ransomware
This is a type of malware that encrypts files on a
computer then demands payment to release them.
The FBI discourages organizations from paying the
ransom because there is never a guarantee that the
criminals will release the files anyway.
Common Security Threats today
and how to prevent them
Zero-Day Vulnerabilities
Zero-day vulnerabilities are weaknesses in a
computing system that can be exploited and are not yet
known. While it is not common for software programs to
have gaping security flaws, when they do, criminals can
develop tools that exploit them to their advantage.
Common Security Threats today
and how to prevent them
Insider Threats
Employees, contractors, and other people with
access to a computer system or network can cause a lot
of harm to an organization. These threats can be
accidental or intentional and can take different forms -
from damaging systems to leaking sensitive data.
Common Security Threats today
and how to prevent them
System Intrusion
A system intrusion is an attack where an
unauthorized person gains access to a computer system
or network. Once they have access, the intruder may
steal data, damage the system, or leave a backdoor for
future attacks.
Common Security Threats today
and how to prevent them