SlideShare ist ein Scribd-Unternehmen logo
1 von 22
THREATS TO INFORMATION SYSTEMS Presented By: Nimisha Walecha MBA( Gen) Roll No. E13
Threats to information systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a Computer Virus? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
[object Object],[object Object]
Basic virus terminology ,[object Object],[object Object],[object Object],[object Object]
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Other computer viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Antivirus software ,[object Object],[object Object],[object Object],[object Object]
SECURITY AND THE INTERNET ,[object Object],[object Object],[object Object],[object Object]
SECURITY AND THE INTERNET ,[object Object],SENDER SCRAMBLED MESSAGE RECIPIENT Encrypt  with public key Decrypt  with private key
Principles of a Simple Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  Caesar Cipher ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Rotating Key Cipher ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
General Principles ,[object Object],[object Object],[object Object],[object Object]
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
Ali Habeeb
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 

Was ist angesagt? (20)

Network security
Network securityNetwork security
Network security
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
12 security policies
12 security policies12 security policies
12 security policies
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Managing information technology
Managing information technologyManaging information technology
Managing information technology
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 

Andere mochten auch

Centura Design & Print Solutions, Inc.
Centura  Design & Print  Solutions, Inc.Centura  Design & Print  Solutions, Inc.
Centura Design & Print Solutions, Inc.
bluetulip1
 
Trabajo electiva universidad mariana
Trabajo electiva universidad marianaTrabajo electiva universidad mariana
Trabajo electiva universidad mariana
GENRY SERRANO
 
Powerpoint fotografía s
Powerpoint fotografía sPowerpoint fotografía s
Powerpoint fotografía s
GENRY SERRANO
 

Andere mochten auch (20)

Centura Design & Print Solutions, Inc.
Centura  Design & Print  Solutions, Inc.Centura  Design & Print  Solutions, Inc.
Centura Design & Print Solutions, Inc.
 
Modulul 1 it
Modulul 1   itModulul 1   it
Modulul 1 it
 
Powerpont for film cover
Powerpont for film coverPowerpont for film cover
Powerpont for film cover
 
Victoria asplund ieso
Victoria asplund iesoVictoria asplund ieso
Victoria asplund ieso
 
Presentation : Amazing Indian Creativity
 Presentation : Amazing Indian Creativity Presentation : Amazing Indian Creativity
Presentation : Amazing Indian Creativity
 
Trabajo electiva universidad mariana
Trabajo electiva universidad marianaTrabajo electiva universidad mariana
Trabajo electiva universidad mariana
 
A Brief History of the Information Lifecycle Landscape
A Brief History of the Information Lifecycle LandscapeA Brief History of the Information Lifecycle Landscape
A Brief History of the Information Lifecycle Landscape
 
Google Apps: 4 ROI cases studies
Google Apps: 4 ROI cases studiesGoogle Apps: 4 ROI cases studies
Google Apps: 4 ROI cases studies
 
Social Media in a Corporate Context Manchester 2010 - Robin Grant, We Are Social
Social Media in a Corporate Context Manchester 2010 - Robin Grant, We Are SocialSocial Media in a Corporate Context Manchester 2010 - Robin Grant, We Are Social
Social Media in a Corporate Context Manchester 2010 - Robin Grant, We Are Social
 
Robots
RobotsRobots
Robots
 
Communicate magazine - Stephen Pain
Communicate magazine - Stephen PainCommunicate magazine - Stephen Pain
Communicate magazine - Stephen Pain
 
Communicate magazine - Neel Bradham
Communicate magazine - Neel BradhamCommunicate magazine - Neel Bradham
Communicate magazine - Neel Bradham
 
Skype & 1000 heads
Skype & 1000 headsSkype & 1000 heads
Skype & 1000 heads
 
Chris Taylor, Future plc, Strategic Thought
Chris Taylor, Future plc, Strategic ThoughtChris Taylor, Future plc, Strategic Thought
Chris Taylor, Future plc, Strategic Thought
 
Learning center
Learning centerLearning center
Learning center
 
Powerpoint fotografía s
Powerpoint fotografía sPowerpoint fotografía s
Powerpoint fotografía s
 
Television
TelevisionTelevision
Television
 
Debates foro humanismo tercero A
Debates foro humanismo tercero ADebates foro humanismo tercero A
Debates foro humanismo tercero A
 
5 básico
5 básico5 básico
5 básico
 
Arrowdawn Offshore Europe 2009 Presentation
Arrowdawn Offshore Europe 2009 PresentationArrowdawn Offshore Europe 2009 Presentation
Arrowdawn Offshore Europe 2009 Presentation
 

Ähnlich wie Threats to an information system

Ähnlich wie Threats to an information system (20)

Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Harmful software
Harmful softwareHarmful software
Harmful software
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
virus
virusvirus
virus
 
Viruses
VirusesViruses
Viruses
 
Computervirus
Computervirus Computervirus
Computervirus
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
viruses
virusesviruses
viruses
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 

Threats to an information system