Threats to a computer
-
Upload
fca-future-chartered-accountants -
Category
Internet
-
view
271 -
download
3
Transcript of Threats to a computer
DEEPIKA SONIIPCC REG. NO. CRO - 0456452
BATCH COMMENCEMENT DATE: 23-January-2013
PROJECT TOPIC: THREATS TO A COMPUTER
SUBMITTED BY:
ITT CENTRE NAME: BIKANER BRANCH OF CIRC OF ICAI
1
This Is To Certify That DEEPIKA SONI Has
Under Taken A Project On “THREAT TO A
COMPUTER” After Going Through The Report,
We Wish To Record Our Satisfaction &
Commend To DEEPIKA SONI For The Effort Put
In By Their In This Exercise.
3
SUBMITTED BY RANJEET SINGH BRAR UNDER THE GUIDANCE OF MISS SONALI JAIN (I.T.T. FACULTY)
Submitted In Partial Fulfillment For The I.T. Training Conducted By
Bikaner Branch Of I.C.A.I For The Course Of I.P.C.C.BATCH NO. BIKANER-1/13/68REG. NO. BKN/2012-13/1358
THREATS TO A COMPUTER
4
While coming on acknowledgement, it seems to me closing oflong chapter of reminiscences which bloomed and gloomed at BRANCHCHAIRMEN , BIKANER BRANCH OF CIRC OFICAI, BIKANER.
This is my proud privilege to express my sincere and deepsense of gratitude my faculty member Ms. SONALI JAIN for inspirationguidance, persistent involvement, scholarly suggestion and constructive criticalsupervision throughout the pursuit of present study.
And finally many thanks to all those friends who keptcompany and who directly or indirectly helped me in the completing of thisproject work.
RANJEET SINGH BRAR
5
Hardware requirements Software Requirement
DVD(DIGITAL VIDEO DISK)
Mouse Microsoft Office2010
Monitor
Keyboard
DEEPIKA SONI , 6
SYSTEM REQUIREMENTS
Operating System = Window7Minimum Hard Disk = 80GBRAM = 4GB
INDEXINTRODUCTION 9TYPES OF VIRUSES AND WORMS 10SYMPTOMS 14COMPONENTS 16HACKER 20HOW NOTICED 25SUGGESTIONS 26PREVENTIONS 31CONCLUSIONS 33REFERENCES 36
DEEPIKA SONI , 7
HOW DO YOU
NOTICE ?
PROGRAMS TAKE LONGER TO LOAD.
PROGRAMS ACCESS MULTIPLE DISK DRIVES.
UNUSUAL AND FREQUENT ACCESS TO DISK.
DISK SPACE DECREASES RAPIDLY.
BAD DISK SECTORS STEADILY INCREASE.
RAM DECREASES SUDDENLY OR STEADILY.
COMPUTER HALTS WITH OR WITHOUT FUNNYMESSAGES.
DEEPIKA SONI , 10
VIRUSES
A piece of code which is capable of copying itself and
typically has A detrimental effect, such as corrupting
the system or destroying data
DEEPIKA SONI , 13
A serious computer failure. A computer crash means that the computer itself stops working or that a program aborts unexpectedly
COMPUTER CRASHES
DEEPIKA SONI , 14
In a computer, a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.
WORMS
DEEPIKA SONI , 15
SAFE COMPUTING
METHODS
YOU MAY
• USE PRE RUN CHECKUPS
• CHANGE FILE ATTRIBUTES
• REINITIALIZE SYSTEM
• REINSTALL APPLICATIONS
• REFORMAT HARD DISK
• OBSERVE OPERATION TIMINGS
• LOG DISK SPACE
• LOG BAD SECTORS
NO !
VIRUS
DEEPIKA SONI , 19
22
1.2 ATTACKS
Threats, Vulnerabilities, and Controls
Attacking Hardware, Software, and Data
A vulnerability is a weakness in the security system, for example,
in procedures, design, or implementation, that might be exploited
to cause loss or harm.
A threat to a computing system is a set of circumstances
that has the potential to cause loss or harm.
A threat is blocked by control of a vulnerability.
23
• In an interruption, an asset of the system becomes lost, unavailable,
or unusable.
• If an unauthorized party not only accesses but tampers with an
asset, the threat is a modification.
• Finally, an unauthorized party might create a fabrication of
counterfeit objects on a computing system.
Types of Threats
• An interception means that some unauthorized party has gained access to anasset.
27
Hardware Vulnerabilities
deliberate attacks on equipment, intending to limit availability,
usually involve theft or destruction.
29
Software Vulnerabilities
Software Deletion
Software Modification
Other categories of software modification include
• a Trojan horse: a program that overtly does one thing while
covertly doing another
• a virus: a specific type of Trojan horse that can be used to
spread its “infection” from one computer to another
• a trapdoor: a program that has a secret entry point
• information leaks in a program: code that makes information
accessible to unauthorized people or programs
Software Theft