SlideShare una empresa de Scribd logo
1 de 22
THREATS TO INFORMATION SYSTEMS Presented By: Nimisha Walecha MBA( Gen) Roll No. E13
Threats to information systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a Computer Virus? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
[object Object],[object Object]
Basic virus terminology ,[object Object],[object Object],[object Object],[object Object]
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Other computer viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Antivirus software ,[object Object],[object Object],[object Object],[object Object]
SECURITY AND THE INTERNET ,[object Object],[object Object],[object Object],[object Object]
SECURITY AND THE INTERNET ,[object Object],SENDER SCRAMBLED MESSAGE RECIPIENT Encrypt  with public key Decrypt  with private key
Principles of a Simple Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  Caesar Cipher ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Rotating Key Cipher ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
General Principles ,[object Object],[object Object],[object Object],[object Object]
THANK YOU

Más contenido relacionado

La actualidad más candente

Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Decision support system-MIS
Decision support system-MISDecision support system-MIS
Decision support system-MISYoga Raja
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information systemPROF.JITENDRA PATEL
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityCarl Ceder
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityarun alfie
 

La actualidad más candente (20)

Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Decision support system-MIS
Decision support system-MISDecision support system-MIS
Decision support system-MIS
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Network security
Network securityNetwork security
Network security
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Information security
Information securityInformation security
Information security
 
Virus
VirusVirus
Virus
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Information security management
Information security managementInformation security management
Information security management
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 

Destacado

Centura Design & Print Solutions, Inc.
Centura  Design & Print  Solutions, Inc.Centura  Design & Print  Solutions, Inc.
Centura Design & Print Solutions, Inc.bluetulip1
 
Modulul 1 it
Modulul 1   itModulul 1   it
Modulul 1 it08alesa
 
Powerpont for film cover
Powerpont for film coverPowerpont for film cover
Powerpont for film coverHanaEllis
 
Victoria asplund ieso
Victoria asplund iesoVictoria asplund ieso
Victoria asplund ieso9Bengelska
 
Presentation : Amazing Indian Creativity
 Presentation : Amazing Indian Creativity Presentation : Amazing Indian Creativity
Presentation : Amazing Indian CreativityYouth Club
 
Trabajo electiva universidad mariana
Trabajo electiva universidad marianaTrabajo electiva universidad mariana
Trabajo electiva universidad marianaGENRY SERRANO
 
A Brief History of the Information Lifecycle Landscape
A Brief History of the Information Lifecycle LandscapeA Brief History of the Information Lifecycle Landscape
A Brief History of the Information Lifecycle LandscapeLane Severson
 
Google Apps: 4 ROI cases studies
Google Apps: 4 ROI cases studiesGoogle Apps: 4 ROI cases studies
Google Apps: 4 ROI cases studiesTom Henn
 
Social Media in a Corporate Context Manchester 2010 - Robin Grant, We Are Social
Social Media in a Corporate Context Manchester 2010 - Robin Grant, We Are SocialSocial Media in a Corporate Context Manchester 2010 - Robin Grant, We Are Social
Social Media in a Corporate Context Manchester 2010 - Robin Grant, We Are SocialCommunicate Magazine
 
Communicate magazine - Stephen Pain
Communicate magazine - Stephen PainCommunicate magazine - Stephen Pain
Communicate magazine - Stephen PainCommunicate Magazine
 
Communicate magazine - Neel Bradham
Communicate magazine - Neel BradhamCommunicate magazine - Neel Bradham
Communicate magazine - Neel BradhamCommunicate Magazine
 
Chris Taylor, Future plc, Strategic Thought
Chris Taylor, Future plc, Strategic ThoughtChris Taylor, Future plc, Strategic Thought
Chris Taylor, Future plc, Strategic ThoughtCommunicate Magazine
 
Powerpoint fotografía s
Powerpoint fotografía sPowerpoint fotografía s
Powerpoint fotografía sGENRY SERRANO
 
Arrowdawn Offshore Europe 2009 Presentation
Arrowdawn Offshore Europe 2009 PresentationArrowdawn Offshore Europe 2009 Presentation
Arrowdawn Offshore Europe 2009 Presentationgopher159
 

Destacado (20)

Centura Design & Print Solutions, Inc.
Centura  Design & Print  Solutions, Inc.Centura  Design & Print  Solutions, Inc.
Centura Design & Print Solutions, Inc.
 
Modulul 1 it
Modulul 1   itModulul 1   it
Modulul 1 it
 
Powerpont for film cover
Powerpont for film coverPowerpont for film cover
Powerpont for film cover
 
Victoria asplund ieso
Victoria asplund iesoVictoria asplund ieso
Victoria asplund ieso
 
Presentation : Amazing Indian Creativity
 Presentation : Amazing Indian Creativity Presentation : Amazing Indian Creativity
Presentation : Amazing Indian Creativity
 
Trabajo electiva universidad mariana
Trabajo electiva universidad marianaTrabajo electiva universidad mariana
Trabajo electiva universidad mariana
 
A Brief History of the Information Lifecycle Landscape
A Brief History of the Information Lifecycle LandscapeA Brief History of the Information Lifecycle Landscape
A Brief History of the Information Lifecycle Landscape
 
Google Apps: 4 ROI cases studies
Google Apps: 4 ROI cases studiesGoogle Apps: 4 ROI cases studies
Google Apps: 4 ROI cases studies
 
Social Media in a Corporate Context Manchester 2010 - Robin Grant, We Are Social
Social Media in a Corporate Context Manchester 2010 - Robin Grant, We Are SocialSocial Media in a Corporate Context Manchester 2010 - Robin Grant, We Are Social
Social Media in a Corporate Context Manchester 2010 - Robin Grant, We Are Social
 
Robots
RobotsRobots
Robots
 
Communicate magazine - Stephen Pain
Communicate magazine - Stephen PainCommunicate magazine - Stephen Pain
Communicate magazine - Stephen Pain
 
Communicate magazine - Neel Bradham
Communicate magazine - Neel BradhamCommunicate magazine - Neel Bradham
Communicate magazine - Neel Bradham
 
Skype & 1000 heads
Skype & 1000 headsSkype & 1000 heads
Skype & 1000 heads
 
Chris Taylor, Future plc, Strategic Thought
Chris Taylor, Future plc, Strategic ThoughtChris Taylor, Future plc, Strategic Thought
Chris Taylor, Future plc, Strategic Thought
 
Learning center
Learning centerLearning center
Learning center
 
Powerpoint fotografía s
Powerpoint fotografía sPowerpoint fotografía s
Powerpoint fotografía s
 
Television
TelevisionTelevision
Television
 
Debates foro humanismo tercero A
Debates foro humanismo tercero ADebates foro humanismo tercero A
Debates foro humanismo tercero A
 
5 básico
5 básico5 básico
5 básico
 
Arrowdawn Offshore Europe 2009 Presentation
Arrowdawn Offshore Europe 2009 PresentationArrowdawn Offshore Europe 2009 Presentation
Arrowdawn Offshore Europe 2009 Presentation
 

Similar a Threats to an information system

Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer VirusImtiaz Ahmed
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital SecurityRichard Homa
 
Harmful software
Harmful softwareHarmful software
Harmful softwareBijoKG2
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 

Similar a Threats to an information system (20)

Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Harmful software
Harmful softwareHarmful software
Harmful software
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
virus
virusvirus
virus
 
Viruses
VirusesViruses
Viruses
 
Computervirus
Computervirus Computervirus
Computervirus
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
viruses
virusesviruses
viruses
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Sowmya
SowmyaSowmya
Sowmya
 

Threats to an information system