Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Tags: report, threats, security, information security threat, network security threats, computer security risks, computer security threats, computer security risk, types computer security risks, data security threats, computer internet security, internet computer security, computer security threat, it security threats, computer, computer security threats report,
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
04-03-2011, 09:54 PM
Post: #1
computer security threats report
full seminar report on the topic computer security threats
31-03-2011, 10:16 AM
Post: #2
RE: computer security threats report
SUBMITTED BY:
SHUBHAM SHARMA


.docx  BON MAHARAJ ENGINEERING COLLEGE.docx (Size: 90.17 KB / Downloads: 64)
Computer Security Threats
Computer systems are vulnerable to many threats that can inflict various types of damage resulting in significant losses. This damage can range from errors harming database integrity to fires destroying entire computer centers. Losses can stem, for example, from the actions of supposedly trusted employees defrauding a system, from outside hackers, or from careless data entry clerks. Precision in estimating computer security-related losses is not possible because many losses are never discovered, and others are "swept under the carpet" to avoid unfavorable publicity. The effects of various threats varies considerably: some affect the confidentiality or integrity of data while others affect the availability of a system.
Errors and Omissions
Errors and omissions are an important threat to data and system integrity. These errors are caused not only by data entry clerks processing hundreds of transactions per day, but also by all types of users who create and edit data.
Fraud and Theft
Computer systems can be exploited for both fraud and theft both by "automating" traditional methods of fraud and by using new methods. For example, individuals may use a computer to skim small amounts of money from a large number of financial accounts, assuming that small discrepancies may not be investigated.
Employee Sabotage
Employees are most familiar with their employer's computers and applications, including knowing what actions might cause the most damage, mischief, or sabotage. The downsizing of organizations in both the public and private sectors has created a group of individuals with organizational knowledge, who may retain potential system access (e.g., if system accounts are not deleted in a timely manner).
Common examples of computer-related employee sabotage include:
• destroying hardware or facilities,
• planting logic bombs that destroy
• programs or data,
• entering data incorrectly,
• "crashing" systems,
• deleting data,
• holding data hostage, and
• changing data.
Malicious Hackers
The term malicious hackers, sometimes called crackers, refers to those who break into computers without authorization. They can include both outsiders and insiders. Much of the rise of hacker activity is often attributed to increases in connectivity in both government and industry.
Malicious Code
Malicious code refers to viruses, worms, Trojan horses, logic bombs, and other "uninvited" software. Sometimes mistakenly associated only with personal computers, malicious code can attack other platforms.
Threats to Personal Privacy
The accumulation of vast amounts of electronic information about individuals by governments, credit bureaus, and private companies, combined with the ability of computers to monitor, process, and aggregate large amounts of information about individuals have created a threat to individual privacy.
The computer security threats covered here are:
• Viruses
• Macro Viruses
• Trojan Horses
• Worms
• Zombies
• Phishing
• Internet Based Attacks
• Viral Web Sites
Rating computer security threats report Options
Share computer security threats report To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : security threats in www, security threats seminar report, computer security threats report free download, seminar report on computer security, seminar report of internet threats, seminar report on security threats in www, project report on computer security attacks, seminar report on computer threats, computer security, common examples of computer related employee sabotage, seminar report on computer security and risks pdf, download seminar report security threats, computer security project report, computer threats seminar report, computer security seminar report, examples of computer threats, computer threat report ideas, project report on network threats,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Campus Selection System Report project girl 2 1,851 Today 04:02 PM
Last Post: mkaasees
  UNIVERSITY MANAGEMENT SYSTEM full report project topics 22 23,977 13-12-2014 02:38 PM
Last Post: mkaasees
  REPORT ON ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD project girl 5 2,283 10-12-2014 11:10 AM
Last Post: mkaasees
  latest ieee projects topics for Computer science ( CSE ) students project topics 13 70,839 10-12-2014 11:04 AM
Last Post: mkaasees
  development of the fields computational facility for computer added anaysis and desig presentation Abstract 0 60 06-12-2014 03:56 PM
Last Post: presentation Abstract
  ELECTRICITY BILL MANAGEMENT SYSTEM REPORT seminar projects maker 2 304 06-12-2014 10:06 AM
Last Post: mkaasees
  Intranet Mailing System full report seminar tips 8 4,521 05-12-2014 11:36 AM
Last Post: mkaasees
  student management system full report project report tiger 63 173,330 04-12-2014 11:18 AM
Last Post: mkaasees
  ONLINE SHOPPING CART full report seminar class 11 22,460 28-11-2014 10:47 AM
Last Post: mkaasees
  1000 computer science projects ideas,topics or titles (New and Updated list) project topics 12 54,058 25-11-2014 02:25 PM
Last Post: Guest
This Page May Contain What is computer security threats report And Latest Information/News About computer security threats report,If Not ...Use Search to get more info about computer security threats report Or Ask Here

Options: