Presentation is loading. Please wait.

Presentation is loading. Please wait.

Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.

Similar presentations


Presentation on theme: "Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats."— Presentation transcript:

1 Threats To Data 30 Threats To Data 30

2 Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats Other Malware Computer Viruses Phishing Accidental Damage Hackers

3 Threats To Data 30 A company’s network security can be breached by people who take a random opportunity, such as an unattended PC Just lock the machine – CTRL/Alt/Del Opportunity Threats

4 Threats To Data 30 Viruses are malicious programs designed to replicate and spread across a computer or a network to damage or corrupt files & data So be clear: a virus is a program Viruses

5 Threats To Data 30 Other Malware GoodBad BenignMalign Malicious

6 Threats To Data 30 Malware is the general name for several other types of malicious software Examples are Trojans, worms, adware and spyware These are all nasty kinds of software that aims to cause damage to files or to steal data Other Malware

7 Threats To Data 30 Means when criminals use fake emails or fake websites They trick people into clicking links and then entering their personal data, such as bank passwords The cyber-criminals then obtain money by fraud and identify theft. Phishing

8 Threats To Data 30 Phishing Criminal now has personal details eg bank password Some fooled so they open fake emails & click links 2 Fake site also looks real so people enter personal details & click Submit 3 4 Send masses of fake emails 1

9 Threats To Data 30 Accidental Damage

10 Threats To Data 30 Accidental Damage So accidental damage can be cause by natural disasters, such as freak weather causing a flood or an earthquake But accidents can also happen that affect the data For example, an untrained user could delete important files

11 Threats To Data 30 People who try to gain unauthorised access to a computer or a network. A high proportion of hackers are people who actually work for an organisation But there are many different types Some hackers just do it for the challenge of breaking through security But there are also cyber-criminals… Hackers

12 Threats To Data 30 Hackers Intercept packets Called ‘packet sniffing’ Can collect passwords etc

13 Threats To Data 30 Hackers That’s why it’s called ‘drive by’ hacking! So home networks need password that’s strong

14 Threats To Data 30 Hackers Malicious Software Program Malware Get Personal Details eg Passwords Harm Computer eg Delete files Cyber Criminals

15 Threats To Data 30 Threats To Data 30

16 Threats To Data 30 Threats To Data 30


Download ppt "Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats."

Similar presentations


Ads by Google