SlideShare uma empresa Scribd logo
1 de 19
Data Loss Causes & Threats
Causes ,[object Object],[object Object],[object Object],[object Object]
VIRUS ,[object Object],[object Object],[object Object],[object Object],[object Object]
Lets Know More about them !!
Computer hoaxes  ,[object Object],[object Object],[object Object]
Computer Hoaxes ,[object Object],[object Object],[object Object]
File Viruses ,[object Object],[object Object]
Macro Viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Macro Viruses ,[object Object],[object Object],[object Object]
Trojans ,[object Object]
Trojan ,[object Object],[object Object],[object Object],[object Object]
Worms ,[object Object]
Worms ,[object Object],[object Object],[object Object],[object Object]
How it affects ? Infected machine user : mac Email Id’s in Address book Like  [email_address]   + Internet Connectivity Worm Mail to  [email_address] from : mac@other.com Mail to  [email_address]  from :  [email_address] + data file attached
Human Error  ,[object Object],[object Object],[object Object]
Case Study ,[object Object]
Sabotage ,[object Object],[object Object],[object Object]
Hacking Hacker Remote FTP Server Remote HTTP Server LAN ICQ, Yahoo, MSN Chat
Natural Disaster ,[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
A5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamed
A5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamedA5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamed
A5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamed
Mohamed Essa
 
-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed
-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed
-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed
Nameer Bilal
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
adni_shadah
 
Computer worm
Computer wormComputer worm
Computer worm
zelkan19
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
amoY91
 

Mais procurados (20)

introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Malware
MalwareMalware
Malware
 
A5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamed
A5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamedA5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamed
A5.1 Maintenance and Security Assignment By_Austin,Nameer,mohamed
 
-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed
-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed
-A5.1 Maintenance and Security Assignment By-Austin,Nameer,mohamed
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
computer virus
computer viruscomputer virus
computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses
VirusesViruses
Viruses
 
Computer worm
Computer wormComputer worm
Computer worm
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 

Semelhante a Data loss causes and its threats

Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
bebo
 

Semelhante a Data loss causes and its threats (20)

SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Computer virus
Computer virusComputer virus
Computer virus
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer virus
 Computer virus Computer virus
Computer virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Information security
Information securityInformation security
Information security
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Último

Último (20)

Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 

Data loss causes and its threats

  • 1. Data Loss Causes & Threats
  • 2.
  • 3.
  • 4. Lets Know More about them !!
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. How it affects ? Infected machine user : mac Email Id’s in Address book Like [email_address] + Internet Connectivity Worm Mail to [email_address] from : mac@other.com Mail to [email_address] from : [email_address] + data file attached
  • 15.
  • 16.
  • 17.
  • 18. Hacking Hacker Remote FTP Server Remote HTTP Server LAN ICQ, Yahoo, MSN Chat
  • 19.