SlideShare uma empresa Scribd logo
1 de 5
IDENTIFYING POTENTIAL
SECURITY RISKS
By Samuel coghlan-white
SPAM
• Spamming is when somebody sends emails or messages to someone. They
normally consist of advertising and phishing
• These messages are usually consistent and unwanted
• Sometimes these messages can contain viruses
ADWARE
• Adware is a advertising program that can track peoples private information
such as search history
• This information shows advertisements based on your personal information
• This software is often unwilling and unknowingly downloaded onto a users
system
SPYWARE
• The definition of spyware is a piece of software that secretly installs itself
onto the user s system
• This software usually collects information for third party use
• This is also called a Trojan horse which disguises itself as different software
to trick the user
• It is normally used by companies to get information about there customers
WORM
• A computer worm is software that speeds and copies itself, it does without
changing any files
• It travels over networks, emails and USB drives

Mais conteúdo relacionado

Mais procurados

Mais procurados (19)

Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Malware
MalwareMalware
Malware
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Ppt123
Ppt123Ppt123
Ppt123
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 
Malware
MalwareMalware
Malware
 
Malwares
MalwaresMalwares
Malwares
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 

Semelhante a Identifying potential security risks

Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To MalwareMichael Carthy
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet securityhoshmand kareem
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Malware and different types of malwares.
Malware and different types of malwares.Malware and different types of malwares.
Malware and different types of malwares.SangishettyDikshitha
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Malware and its types
Malware and its typesMalware and its types
Malware and its typesShouaQureshi
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 

Semelhante a Identifying potential security risks (20)

Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To Malware
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Malicious
MaliciousMalicious
Malicious
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Malware and different types of malwares.
Malware and different types of malwares.Malware and different types of malwares.
Malware and different types of malwares.
 
Security
SecuritySecurity
Security
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Mais de samthking25

P1 unit 2 2014 by samuel coghlan white
P1 unit 2    2014 by samuel coghlan whiteP1 unit 2    2014 by samuel coghlan white
P1 unit 2 2014 by samuel coghlan whitesamthking25
 
Utc summer project by samuel coghlan white (best 1 evr)
Utc summer project by samuel coghlan white (best 1 evr)Utc summer project by samuel coghlan white (best 1 evr)
Utc summer project by samuel coghlan white (best 1 evr)samthking25
 
Twitter security
Twitter securityTwitter security
Twitter securitysamthking25
 
Changing a right handed mouse by samuel c w
Changing a right handed mouse by samuel c wChanging a right handed mouse by samuel c w
Changing a right handed mouse by samuel c wsamthking25
 
How to change the screen resolution by samuel c w!
How to change the screen resolution by samuel c w!How to change the screen resolution by samuel c w!
How to change the screen resolution by samuel c w!samthking25
 
How to change your desktop background by samuel coghlan white
How to change your desktop background by samuel coghlan whiteHow to change your desktop background by samuel coghlan white
How to change your desktop background by samuel coghlan whitesamthking25
 
How to change icon size by coghlan white
How to change icon size by coghlan whiteHow to change icon size by coghlan white
How to change icon size by coghlan whitesamthking25
 
Backing up data on windows 7 step by
Backing up data on windows 7 step byBacking up data on windows 7 step by
Backing up data on windows 7 step bysamthking25
 
Samuel saftey poster
Samuel saftey posterSamuel saftey poster
Samuel saftey postersamthking25
 
Various ways to connect to a network
Various ways to connect to a networkVarious ways to connect to a network
Various ways to connect to a networksamthking25
 
The importance of antivirus software
The importance of antivirus softwareThe importance of antivirus software
The importance of antivirus softwaresamthking25
 
Desktop by samuel c w
Desktop by samuel c wDesktop by samuel c w
Desktop by samuel c wsamthking25
 
Windows 7 vs windows 8 (1)
Windows 7 vs windows 8 (1)Windows 7 vs windows 8 (1)
Windows 7 vs windows 8 (1)samthking25
 
Data flow diagrams unit 3 by sammy c dubs
Data flow diagrams unit 3 by sammy c dubsData flow diagrams unit 3 by sammy c dubs
Data flow diagrams unit 3 by sammy c dubssamthking25
 
Systems by samuel c w cisco br7
Systems by samuel c w cisco br7Systems by samuel c w cisco br7
Systems by samuel c w cisco br7samthking25
 
Unit 3 P1 Cisco Samuel coghlan-white
Unit 3 P1 Cisco Samuel coghlan-white Unit 3 P1 Cisco Samuel coghlan-white
Unit 3 P1 Cisco Samuel coghlan-white samthking25
 
P3 by samuel (login guide)
P3 by samuel (login guide)P3 by samuel (login guide)
P3 by samuel (login guide)samthking25
 

Mais de samthking25 (17)

P1 unit 2 2014 by samuel coghlan white
P1 unit 2    2014 by samuel coghlan whiteP1 unit 2    2014 by samuel coghlan white
P1 unit 2 2014 by samuel coghlan white
 
Utc summer project by samuel coghlan white (best 1 evr)
Utc summer project by samuel coghlan white (best 1 evr)Utc summer project by samuel coghlan white (best 1 evr)
Utc summer project by samuel coghlan white (best 1 evr)
 
Twitter security
Twitter securityTwitter security
Twitter security
 
Changing a right handed mouse by samuel c w
Changing a right handed mouse by samuel c wChanging a right handed mouse by samuel c w
Changing a right handed mouse by samuel c w
 
How to change the screen resolution by samuel c w!
How to change the screen resolution by samuel c w!How to change the screen resolution by samuel c w!
How to change the screen resolution by samuel c w!
 
How to change your desktop background by samuel coghlan white
How to change your desktop background by samuel coghlan whiteHow to change your desktop background by samuel coghlan white
How to change your desktop background by samuel coghlan white
 
How to change icon size by coghlan white
How to change icon size by coghlan whiteHow to change icon size by coghlan white
How to change icon size by coghlan white
 
Backing up data on windows 7 step by
Backing up data on windows 7 step byBacking up data on windows 7 step by
Backing up data on windows 7 step by
 
Samuel saftey poster
Samuel saftey posterSamuel saftey poster
Samuel saftey poster
 
Various ways to connect to a network
Various ways to connect to a networkVarious ways to connect to a network
Various ways to connect to a network
 
The importance of antivirus software
The importance of antivirus softwareThe importance of antivirus software
The importance of antivirus software
 
Desktop by samuel c w
Desktop by samuel c wDesktop by samuel c w
Desktop by samuel c w
 
Windows 7 vs windows 8 (1)
Windows 7 vs windows 8 (1)Windows 7 vs windows 8 (1)
Windows 7 vs windows 8 (1)
 
Data flow diagrams unit 3 by sammy c dubs
Data flow diagrams unit 3 by sammy c dubsData flow diagrams unit 3 by sammy c dubs
Data flow diagrams unit 3 by sammy c dubs
 
Systems by samuel c w cisco br7
Systems by samuel c w cisco br7Systems by samuel c w cisco br7
Systems by samuel c w cisco br7
 
Unit 3 P1 Cisco Samuel coghlan-white
Unit 3 P1 Cisco Samuel coghlan-white Unit 3 P1 Cisco Samuel coghlan-white
Unit 3 P1 Cisco Samuel coghlan-white
 
P3 by samuel (login guide)
P3 by samuel (login guide)P3 by samuel (login guide)
P3 by samuel (login guide)
 

Último

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Último (20)

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Identifying potential security risks

  • 2. SPAM • Spamming is when somebody sends emails or messages to someone. They normally consist of advertising and phishing • These messages are usually consistent and unwanted • Sometimes these messages can contain viruses
  • 3. ADWARE • Adware is a advertising program that can track peoples private information such as search history • This information shows advertisements based on your personal information • This software is often unwilling and unknowingly downloaded onto a users system
  • 4. SPYWARE • The definition of spyware is a piece of software that secretly installs itself onto the user s system • This software usually collects information for third party use • This is also called a Trojan horse which disguises itself as different software to trick the user • It is normally used by companies to get information about there customers
  • 5. WORM • A computer worm is software that speeds and copies itself, it does without changing any files • It travels over networks, emails and USB drives