computer security threats report
#1

full seminar report on the topic computer security threats
Reply
#2
SUBMITTED BY:
SHUBHAM SHARMA

[attachment=11381]
Computer Security Threats
Computer systems are vulnerable to many threats that can inflict various types of damage resulting in significant losses. This damage can range from errors harming database integrity to fires destroying entire computer centers. Losses can stem, for example, from the actions of supposedly trusted employees defrauding a system, from outside hackers, or from careless data entry clerks. Precision in estimating computer security-related losses is not possible because many losses are never discovered, and others are "swept under the carpet" to avoid unfavorable publicity. The effects of various threats varies considerably: some affect the confidentiality or integrity of data while others affect the availability of a system.
Errors and Omissions
Errors and omissions are an important threat to data and system integrity. These errors are caused not only by data entry clerks processing hundreds of transactions per day, but also by all types of users who create and edit data.
Fraud and Theft
Computer systems can be exploited for both fraud and theft both by "automating" traditional methods of fraud and by using new methods. For example, individuals may use a computer to skim small amounts of money from a large number of financial accounts, assuming that small discrepancies may not be investigated.
Employee Sabotage
Employees are most familiar with their employer's computers and applications, including knowing what actions might cause the most damage, mischief, or sabotage. The downsizing of organizations in both the public and private sectors has created a group of individuals with organizational knowledge, who may retain potential system access (e.g., if system accounts are not deleted in a timely manner).
Common examples of computer-related employee sabotage include:
• destroying hardware or facilities,
• planting logic bombs that destroy
• programs or data,
• entering data incorrectly,
• "crashing" systems,
• deleting data,
• holding data hostage, and
• changing data.
Malicious Hackers
The term malicious hackers, sometimes called crackers, refers to those who break into computers without authorization. They can include both outsiders and insiders. Much of the rise of hacker activity is often attributed to increases in connectivity in both government and industry.
Malicious Code
Malicious code refers to viruses, worms, Trojan horses, logic bombs, and other "uninvited" software. Sometimes mistakenly associated only with personal computers, malicious code can attack other platforms.
Threats to Personal Privacy
The accumulation of vast amounts of electronic information about individuals by governments, credit bureaus, and private companies, combined with the ability of computers to monitor, process, and aggregate large amounts of information about individuals have created a threat to individual privacy.
The computer security threats covered here are:
• Viruses
• Macro Viruses
• Trojan Horses
• Worms
• Zombies
• Phishing
• Internet Based Attacks
• Viral Web Sites
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: security threats on internet project report, security threats in world wide web seminar, enterprise infrastructure from wireless threats, seminar cloud computing security threats and response, security threats in cloud computing technical seminar ppt, att wireless threats, computer network security,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cloud Computing Security: From Single to Multi-Clouds 1 828 14-02-2017, 04:56 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  projects on computer networks? shakir_ali 2 1,595 25-01-2016, 02:26 PM
Last Post: seminar report asees
  Security system using IP camera mechanical engineering crazy 5 4,375 16-03-2015, 02:52 PM
Last Post: seminar report asees
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,262 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,700 11-09-2014, 07:45 PM
Last Post: erhhk
  Folder Security System computer science topics 6 3,669 29-07-2013, 11:09 AM
Last Post: computer topic
  Brain Computer Interface Design Using Band Powers Extracted During Mental Tasks seminar class 1 2,026 01-01-2013, 10:48 AM
Last Post: seminar details
  Internet Security and Firewall Design smart paper boy 1 1,856 10-12-2012, 01:23 PM
Last Post: seminar details
  latest computer science project topics project topics 1 3,612 28-11-2012, 01:11 PM
Last Post: seminar details

Forum Jump: