Threats to a computer

29
DEEPIKA SONI IPCC REG. NO. CRO - 0456452 BATCH COMMENCEMENT DATE: 23-January-2013 PROJECT TOPIC: THREATS TO A COMPUTER SUBMITTED BY: ITT CENTRE NAME: BIKANER BRANCH OF CIRC OF ICAI 1

Transcript of Threats to a computer

DEEPIKA SONIIPCC REG. NO. CRO - 0456452

BATCH COMMENCEMENT DATE: 23-January-2013

PROJECT TOPIC: THREATS TO A COMPUTER

SUBMITTED BY:

ITT CENTRE NAME: BIKANER BRANCH OF CIRC OF ICAI

1

2

This Is To Certify That DEEPIKA SONI Has

Under Taken A Project On “THREAT TO A

COMPUTER” After Going Through The Report,

We Wish To Record Our Satisfaction &

Commend To DEEPIKA SONI For The Effort Put

In By Their In This Exercise.

3

SUBMITTED BY RANJEET SINGH BRAR UNDER THE GUIDANCE OF MISS SONALI JAIN (I.T.T. FACULTY)

Submitted In Partial Fulfillment For The I.T. Training Conducted By

Bikaner Branch Of I.C.A.I For The Course Of I.P.C.C.BATCH NO. BIKANER-1/13/68REG. NO. BKN/2012-13/1358

THREATS TO A COMPUTER

4

While coming on acknowledgement, it seems to me closing oflong chapter of reminiscences which bloomed and gloomed at BRANCHCHAIRMEN , BIKANER BRANCH OF CIRC OFICAI, BIKANER.

This is my proud privilege to express my sincere and deepsense of gratitude my faculty member Ms. SONALI JAIN for inspirationguidance, persistent involvement, scholarly suggestion and constructive criticalsupervision throughout the pursuit of present study.

And finally many thanks to all those friends who keptcompany and who directly or indirectly helped me in the completing of thisproject work.

RANJEET SINGH BRAR

5

Hardware requirements Software Requirement

DVD(DIGITAL VIDEO DISK)

Mouse Microsoft Office2010

Monitor

Keyboard

DEEPIKA SONI , 6

SYSTEM REQUIREMENTS

Operating System = Window7Minimum Hard Disk = 80GBRAM = 4GB

INDEXINTRODUCTION 9TYPES OF VIRUSES AND WORMS 10SYMPTOMS 14COMPONENTS 16HACKER 20HOW NOTICED 25SUGGESTIONS 26PREVENTIONS 31CONCLUSIONS 33REFERENCES 36

DEEPIKA SONI , 7

INDEX

DEEPIKA SONI , 8

THREAT

ANYTIHNG THAT MAY

DAMAGE, HURT OR LOSS IS

CALLED THREAT.

DEEPIKA SONI , 9

HOW DO YOU

NOTICE ?

PROGRAMS TAKE LONGER TO LOAD.

PROGRAMS ACCESS MULTIPLE DISK DRIVES.

UNUSUAL AND FREQUENT ACCESS TO DISK.

DISK SPACE DECREASES RAPIDLY.

BAD DISK SECTORS STEADILY INCREASE.

RAM DECREASES SUDDENLY OR STEADILY.

COMPUTER HALTS WITH OR WITHOUT FUNNYMESSAGES.

DEEPIKA SONI , 10

DEEPIKA SONI , 11

A person who uses computers

to gain unauthorized access to data

HACKERS

DEEPIKA SONI , 12

VIRUSES

A piece of code which is capable of copying itself and

typically has A detrimental effect, such as corrupting

the system or destroying data

DEEPIKA SONI , 13

A serious computer failure. A computer crash means that the computer itself stops working or that a program aborts unexpectedly

COMPUTER CRASHES

DEEPIKA SONI , 14

In a computer, a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.

WORMS

DEEPIKA SONI , 15

Pop-ups on your computer wh

en you use your internet browser

POP-UPS

DEEPIKA SONI , 16

LOST DATA

DEEPIKA SONI , 17

WHAT TO DO ?

DEEPIKA SONI , 18

SAFE COMPUTING

METHODS

YOU MAY

• USE PRE RUN CHECKUPS

• CHANGE FILE ATTRIBUTES

• REINITIALIZE SYSTEM

• REINSTALL APPLICATIONS

• REFORMAT HARD DISK

• OBSERVE OPERATION TIMINGS

• LOG DISK SPACE

• LOG BAD SECTORS

NO !

VIRUS

DEEPIKA SONI , 19

CONCLUSION

DEEPIKA SONI , 20

REFERENCES

DEEPIKA SONI , 21

22

1.2 ATTACKS

Threats, Vulnerabilities, and Controls

Attacking Hardware, Software, and Data

A vulnerability is a weakness in the security system, for example,

in procedures, design, or implementation, that might be exploited

to cause loss or harm.

A threat to a computing system is a set of circumstances

that has the potential to cause loss or harm.

A threat is blocked by control of a vulnerability.

23

• In an interruption, an asset of the system becomes lost, unavailable,

or unusable.

• If an unauthorized party not only accesses but tampers with an

asset, the threat is a modification.

• Finally, an unauthorized party might create a fabrication of

counterfeit objects on a computing system.

Types of Threats

• An interception means that some unauthorized party has gained access to anasset.

24

26

Vulnerabilities

27

Hardware Vulnerabilities

deliberate attacks on equipment, intending to limit availability,

usually involve theft or destruction.

29

Software Vulnerabilities

Software Deletion

Software Modification

Other categories of software modification include

• a Trojan horse: a program that overtly does one thing while

covertly doing another

• a virus: a specific type of Trojan horse that can be used to

spread its “infection” from one computer to another

• a trapdoor: a program that has a secret entry point

• information leaks in a program: code that makes information

accessible to unauthorized people or programs

Software Theft