SlideShare uma empresa Scribd logo
1 de 19
Data Loss Causes & Threats
Causes ,[object Object],[object Object],[object Object],[object Object]
VIRUS ,[object Object],[object Object],[object Object],[object Object],[object Object]
Lets Know More about them !!
Computer hoaxes  ,[object Object],[object Object],[object Object]
Computer Hoaxes ,[object Object],[object Object],[object Object]
File Viruses ,[object Object],[object Object]
Macro Viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Macro Viruses ,[object Object],[object Object],[object Object]
Trojans ,[object Object]
Trojan ,[object Object],[object Object],[object Object],[object Object]
Worms ,[object Object]
Worms ,[object Object],[object Object],[object Object],[object Object]
How it affects ? Infected machine user : mac Email Id’s in Address book Like  [email_address]   + Internet Connectivity Worm Mail to  [email_address] from : mac@other.com Mail to  [email_address]  from :  [email_address] + data file attached
Human Error  ,[object Object],[object Object],[object Object]
Case Study ,[object Object]
Sabotage ,[object Object],[object Object],[object Object]
Hacking Hacker Remote FTP Server Remote HTTP Server LAN ICQ, Yahoo, MSN Chat
Natural Disaster ,[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
A5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamed
A5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamedA5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamed
A5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamed
Mohamed Essa
 
-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed
-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed
-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed
Nameer Bilal
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
adni_shadah
 
Computer worm
Computer wormComputer worm
Computer worm
zelkan19
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
amoY91
 

Mais procurados (20)

introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Malware
MalwareMalware
Malware
 
A5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamed
A5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamedA5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamed
A5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamed
 
-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed
-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed
-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
computer virus
computer viruscomputer virus
computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses
VirusesViruses
Viruses
 
Computer worm
Computer wormComputer worm
Computer worm
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 

Semelhante a Data loss causes and its threats

Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
bebo
 

Semelhante a Data loss causes and its threats (20)

SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Computer virus
Computer virusComputer virus
Computer virus
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer virus
 Computer virus Computer virus
Computer virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Information security
Information securityInformation security
Information security
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Data loss causes and its threats

  • 1. Data Loss Causes & Threats
  • 2.
  • 3.
  • 4. Lets Know More about them !!
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. How it affects ? Infected machine user : mac Email Id’s in Address book Like [email_address] + Internet Connectivity Worm Mail to [email_address] from : mac@other.com Mail to [email_address] from : [email_address] + data file attached
  • 15.
  • 16.
  • 17.
  • 18. Hacking Hacker Remote FTP Server Remote HTTP Server LAN ICQ, Yahoo, MSN Chat
  • 19.