Basic Security Concepts ICT Presentation
Basic Security Concepts ICT Presentation
SECURITY
CONCEPT
PRESENTED
BY GROUP
1.
Syed Ali Saim Hassan Ali
Masoomah Hussnain
Group Representer : KHADIJA
Shabbir Ali
members
INTRODUCTIO
N:
Basic security concepts are fundamental
principles designed to protect information,
systems and resources from threats.
These concepts are crucial because they
protect sensitive information, ensure
accessibility and built trust.
Presentation Title 3
Threats to user security
refer to risks that can
compromise a user's
personal information,
data, or safety, often
THREAT through digital means.
S TO
USER.
Phishing Spyware Malware
IDENTITY
THEFT:
Identity theft is when someone illegally obtains and uses another person’s
personal information—like their name, Social Security number, credit card
number, or bank account details without permission.
PREVENTION
TYPES S:
• Financial • Protect
personal
• Criminal information
• Use passwords.
• Medical • Monitor credit
card details
PURPOSE
• To commit CONSEQUEN COMMON
fraud. CES METHODS
• To make
• Financial loss
purchases.
• Emotional
• Data
stress breaches
• Time and • Skimming
Efford. • Phishig
5
ONLINE THEFT:
Online theft, or cyber theft, is the illegal act of
stealing personal, financial, or intellectual property
through internet-based methods. This often
includes hacking, phishing, and other digital fraud
techniques.
PURPOSE COMMON
TECNIQUES
Online thieves aim to • Hacking
steal money, sensitive • Social Engineering
data, or personal • Malware
information, which they
• Keylogging
can use for financial
gain or sell on illegal
markets.
Presentation Title
ONLINE Online fraud is the intentional deception conducted over the
• Investment
• Financial losses
Scams
Aim to steal • Identity thief
• E-Commerce
money, • Reputational
frauds • Spoofing
sensitive data, damage
or personal • Charity • Malware
• Emotional
information scams • Fake Ads distress
• Auction
LOSS OF DATA BREACHING:
PRIVACY: Gain of access to sensitive data by an
Privacy loss of a user refers to the organization
unauthorized exposure, access and
use of personal data and TRACKING:
information about an individual. Process of collecting and monitoring
information about an individual.
PACKET APPS IN
Phishing COOKIES:
tools: SNIFFERS: MOBILE:
Presentation Title
.
Ransomware:
Locks or encrypts
TYPES: files until a
ransom is paid
Adware: Displays
Spyware: Collects
unwanted
data secretly.
MALWAR advertisements.
• Rootkits: Hide
• Often requires user malicious activity by
interaction to activate gaining root access.
• Botnets: Network of
infected computers
controlled remotely.
CYBERCRIM Definition: Criminal activities carried out using
computers and the internet.
E:
TYPES:
Financial Fraud: Hacking:
Manipulating data Unauthorized access
or systems for to systems.
financial gain.
Presentation Title
CYBER TERRORISM
The use of internet-based
attacks to disrupt or damage
critical infrastructure for
political or ideological purposes.
Presentation Title
Countermeasures
Techniques or action used to prevent or respond security threats.
• ENVIRONMENTAL CONTROL
• SURGE PROTECTION
• REGULAR MAINTENANCE
HARDWARE LOSS
Hardware loss refers to the
unintentional or accidental
misplacement , theft or destruction
of physical computing devices and
components resulting in their
unavailability unaccessibility or
permanent removal from service.
Presentation Title
SYSTEM
FAILURE:
System Failure means a situation where a computer system, software, or hardware
stops working correctly or completely crashes.
CAUSES:
1. SOFTWARE BUGS.
2. HARDWAREMALFUNCTIONS
3. POWER PROBLEMS
4. OVERLOAD
5. CYBERATTACKS
6. DATA LOSS
7. SECURITY RISKS
8. FINANCIAL LOSS
UNAUTHORIZED ACCESS
Unauthorized access and use in software refer to situations where someone enters
systems, networks, or data without permission.
CAUSES
NATURAL DISASTERS
Such as floods, fires, earthquakes, or other natural events, can impact software
and computer systems by damaging physical infrastructure and disrupting
operations.
THREATS