SlideShare a Scribd company logo
1 of 28
Most common threats to  information security Ana Meskovska [email_address]   ELSA Conference Strumica,  27.11.2008
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is an information security threat? ,[object Object],[object Object],[object Object],[object Object]
Information security threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Security Breaches Survey 2008  1/3 ,[object Object]
Information Security Breaches Survey 2008 2/3 ,[object Object],How many UK businesses have disaster recovery plans?
Information Security Breaches Survey 2008 3/3 ,[object Object]
Internet security threats ,[object Object],[object Object],[object Object],[object Object]
Most common internet threats, consequences and protection Malware   threats
Malware threat ,[object Object],[object Object],[object Object]
Security  and productivity threats posed by malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protection against malwares ,[object Object],[object Object],[object Object],[object Object],[object Object]
Most common internet threats, consequences and protection E-mail threats
Threats to the security of e-mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Countermeasures to e-mail security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
When using an e-mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Precautions when using a e-mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Most common internet threats, consequences and protection SPAM
Security threats from SPAM  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Countermeasures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Most common internet threats, consequences and protection Social Engineering Threat (Phishing)
Social Engineering ,[object Object],[object Object],[object Object]
Security threats from phishing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Prevention ,[object Object],[object Object],[object Object],[object Object]
Top 10 internet threats
TOP 10 threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Application Security
Application SecurityApplication Security
Application Securityflorinc
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organizationTejas Wasule
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 

What's hot (20)

Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Application Security
Application SecurityApplication Security
Application Security
 
cyber security
cyber securitycyber security
cyber security
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Information security
Information securityInformation security
Information security
 

Viewers also liked

Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Ethical issues in business
Ethical issues in businessEthical issues in business
Ethical issues in businessDanish Musthafa
 
Penyajian Data dalam Bentuk Diagram Batang, Lambang, Garis dan Lingkaran
Penyajian Data dalam Bentuk Diagram Batang, Lambang, Garis dan LingkaranPenyajian Data dalam Bentuk Diagram Batang, Lambang, Garis dan Lingkaran
Penyajian Data dalam Bentuk Diagram Batang, Lambang, Garis dan LingkaranHariyatunnisa Ahmad
 
Calibration & Testing of Electronic Meters
Calibration & Testing of Electronic MetersCalibration & Testing of Electronic Meters
Calibration & Testing of Electronic MetersSnehpal Singh
 
Electronic Filing and Payment System For Entrepreneurs, Self-Employed Individ...
Electronic Filing and Payment System For Entrepreneurs, Self-Employed Individ...Electronic Filing and Payment System For Entrepreneurs, Self-Employed Individ...
Electronic Filing and Payment System For Entrepreneurs, Self-Employed Individ...elizabeth costales
 
Mis case study - Procter & Gamble
Mis case study  - Procter & GambleMis case study  - Procter & Gamble
Mis case study - Procter & GambleNightfurry Faysal
 
Data center Building & General Specification
Data center Building & General Specification Data center Building & General Specification
Data center Building & General Specification Ali Mirfallah
 
Energy conservation week celebration
Energy conservation week celebrationEnergy conservation week celebration
Energy conservation week celebrationSudha Arun
 
Data Warehouse Optimization
Data Warehouse OptimizationData Warehouse Optimization
Data Warehouse OptimizationCloudera, Inc.
 
CUDA performance study on Hadoop MapReduce Cluster
CUDA performance study on Hadoop MapReduce ClusterCUDA performance study on Hadoop MapReduce Cluster
CUDA performance study on Hadoop MapReduce Clusterairbots
 
Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security Bahtiyar Bircan
 
Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...
Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...
Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...Dr.Choen Krainara
 

Viewers also liked (20)

Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Security threats
Security threatsSecurity threats
Security threats
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Ethical issues in business
Ethical issues in businessEthical issues in business
Ethical issues in business
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Penyajian Data dalam Bentuk Diagram Batang, Lambang, Garis dan Lingkaran
Penyajian Data dalam Bentuk Diagram Batang, Lambang, Garis dan LingkaranPenyajian Data dalam Bentuk Diagram Batang, Lambang, Garis dan Lingkaran
Penyajian Data dalam Bentuk Diagram Batang, Lambang, Garis dan Lingkaran
 
The Fashion Channel
The Fashion ChannelThe Fashion Channel
The Fashion Channel
 
Calibration & Testing of Electronic Meters
Calibration & Testing of Electronic MetersCalibration & Testing of Electronic Meters
Calibration & Testing of Electronic Meters
 
Unit 1 Task 1
Unit 1 Task 1Unit 1 Task 1
Unit 1 Task 1
 
Electronic Filing and Payment System For Entrepreneurs, Self-Employed Individ...
Electronic Filing and Payment System For Entrepreneurs, Self-Employed Individ...Electronic Filing and Payment System For Entrepreneurs, Self-Employed Individ...
Electronic Filing and Payment System For Entrepreneurs, Self-Employed Individ...
 
Mis case study - Procter & Gamble
Mis case study  - Procter & GambleMis case study  - Procter & Gamble
Mis case study - Procter & Gamble
 
Data center Building & General Specification
Data center Building & General Specification Data center Building & General Specification
Data center Building & General Specification
 
Energy conservation week celebration
Energy conservation week celebrationEnergy conservation week celebration
Energy conservation week celebration
 
Data Warehouse Optimization
Data Warehouse OptimizationData Warehouse Optimization
Data Warehouse Optimization
 
CUDA performance study on Hadoop MapReduce Cluster
CUDA performance study on Hadoop MapReduce ClusterCUDA performance study on Hadoop MapReduce Cluster
CUDA performance study on Hadoop MapReduce Cluster
 
Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security
 
Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...
Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...
Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...
 

Similar to 3 Most Common Threats Of Information Security

Computer Threat.pdf
Computer Threat.pdfComputer Threat.pdf
Computer Threat.pdfZaraFatima29
 
Cyber security
Cyber securityCyber security
Cyber securityAkdu095
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Cybersecurity
CybersecurityCybersecurity
CybersecuritySabiha M
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 

Similar to 3 Most Common Threats Of Information Security (20)

Computer Threat.pdf
Computer Threat.pdfComputer Threat.pdf
Computer Threat.pdf
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Seminar ppt.pptx
Seminar ppt.pptxSeminar ppt.pptx
Seminar ppt.pptx
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

More from Ana Meskovska

Assessing the institutionalisation of knowledge in an automotive factory at Fiat
Assessing the institutionalisation of knowledge in an automotive factory at FiatAssessing the institutionalisation of knowledge in an automotive factory at Fiat
Assessing the institutionalisation of knowledge in an automotive factory at FiatAna Meskovska
 
Stimulating management innovation through knowledge management
Stimulating management innovation through knowledge management Stimulating management innovation through knowledge management
Stimulating management innovation through knowledge management Ana Meskovska
 
E-educational games in formal education - Poster
E-educational games in formal education - PosterE-educational games in formal education - Poster
E-educational games in formal education - PosterAna Meskovska
 
E-educational games in formal education - ePrototype Bazaar 2011
E-educational games in formal education - ePrototype Bazaar 2011E-educational games in formal education - ePrototype Bazaar 2011
E-educational games in formal education - ePrototype Bazaar 2011Ana Meskovska
 
How to implement effective ITSM System
How to implement effective ITSM SystemHow to implement effective ITSM System
How to implement effective ITSM SystemAna Meskovska
 
Increasing trust towards governmental e-services
Increasing trust towards governmental e-servicesIncreasing trust towards governmental e-services
Increasing trust towards governmental e-servicesAna Meskovska
 
Increasing trust towards government e-services
Increasing trust towards government e-servicesIncreasing trust towards government e-services
Increasing trust towards government e-servicesAna Meskovska
 
Information Security for increased usage of e-services - Masit Open Days 2010
Information Security for increased usage of e-services - Masit Open Days  2010Information Security for increased usage of e-services - Masit Open Days  2010
Information Security for increased usage of e-services - Masit Open Days 2010Ana Meskovska
 
E-prototype bazaar - Makedonija
E-prototype bazaar - MakedonijaE-prototype bazaar - Makedonija
E-prototype bazaar - MakedonijaAna Meskovska
 
Proposal for cross border cooperation
Proposal for cross border cooperationProposal for cross border cooperation
Proposal for cross border cooperationAna Meskovska
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of InformationAna Meskovska
 
4 System For Information Security
4 System For Information Security4 System For Information Security
4 System For Information SecurityAna Meskovska
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On InternetAna Meskovska
 
Business Process Modeling
Business Process ModelingBusiness Process Modeling
Business Process ModelingAna Meskovska
 
ITSM Qualification Schemes
ITSM Qualification SchemesITSM Qualification Schemes
ITSM Qualification SchemesAna Meskovska
 
Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000Ana Meskovska
 
Integration of ICT Standards
Integration of ICT StandardsIntegration of ICT Standards
Integration of ICT StandardsAna Meskovska
 

More from Ana Meskovska (18)

Assessing the institutionalisation of knowledge in an automotive factory at Fiat
Assessing the institutionalisation of knowledge in an automotive factory at FiatAssessing the institutionalisation of knowledge in an automotive factory at Fiat
Assessing the institutionalisation of knowledge in an automotive factory at Fiat
 
Stimulating management innovation through knowledge management
Stimulating management innovation through knowledge management Stimulating management innovation through knowledge management
Stimulating management innovation through knowledge management
 
E-educational games in formal education - Poster
E-educational games in formal education - PosterE-educational games in formal education - Poster
E-educational games in formal education - Poster
 
E-educational games in formal education - ePrototype Bazaar 2011
E-educational games in formal education - ePrototype Bazaar 2011E-educational games in formal education - ePrototype Bazaar 2011
E-educational games in formal education - ePrototype Bazaar 2011
 
How to implement effective ITSM System
How to implement effective ITSM SystemHow to implement effective ITSM System
How to implement effective ITSM System
 
Increasing trust towards governmental e-services
Increasing trust towards governmental e-servicesIncreasing trust towards governmental e-services
Increasing trust towards governmental e-services
 
Increasing trust towards government e-services
Increasing trust towards government e-servicesIncreasing trust towards government e-services
Increasing trust towards government e-services
 
Information Security for increased usage of e-services - Masit Open Days 2010
Information Security for increased usage of e-services - Masit Open Days  2010Information Security for increased usage of e-services - Masit Open Days  2010
Information Security for increased usage of e-services - Masit Open Days 2010
 
E-prototype bazaar - Makedonija
E-prototype bazaar - MakedonijaE-prototype bazaar - Makedonija
E-prototype bazaar - Makedonija
 
Proposal for cross border cooperation
Proposal for cross border cooperationProposal for cross border cooperation
Proposal for cross border cooperation
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information
 
4 System For Information Security
4 System For Information Security4 System For Information Security
4 System For Information Security
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
 
Business Process Modeling
Business Process ModelingBusiness Process Modeling
Business Process Modeling
 
ITSM Qualification Schemes
ITSM Qualification SchemesITSM Qualification Schemes
ITSM Qualification Schemes
 
Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000
 
Integration of ICT Standards
Integration of ICT StandardsIntegration of ICT Standards
Integration of ICT Standards
 

3 Most Common Threats Of Information Security

Editor's Notes

  1. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. Computer security can focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer.
  2. A rootkit is malware which consists of a program (or combination of several programs) designed to take fundamental control (in Unix terms "root" access, in Windows terms, "Administrator" or "Admin" access) of a computer system, without authorization by the system's owners and legitimate managers
  3. A denial-of-service attack ( DoS attack ) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted, malevolent efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even DNS root servers . Loss of confidentiality E-mails are sent in clear over open networks E-mails stored on potentially insecure clients and mail servers Loss of integrity No integrity protection on e-mails; body can be altered in transit or on mail server
  4. POP, IMAP over ssh, SSL – protokoli PGP – enkripcija I dekripcija
  5. Viruses Programs that can be attached to emails and are spread as files from individual to individual. Viruses are intentionally destructive Worms Self replicating computers programs, similar to computer viruses however do not require other programs or documents to spread. Trojans non-replicating malicious programs which appears harmless or even useful to the user but when executed harms the user’s System Spyware Programs installed on computers which record and send your personal information – includes marketing info( visited sites, lists of your software, your interests ,etc…) Phishing attempt to fraudulently acquire sensitive information, such as password and financial information, through email or an instant message
  6. In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what used to be called a "con game". Social Engineering is clever manipulation of the natural human tendency to trust. As a rule, public sector employees care about the jobs they do and try their best to be helpful. “ Social engineering attacks are mostly financially driven, with the attacker looking to obtain confidential information. Some of the common tactics used for such attacks are forging identities, exploiting the inability of people to realize the value of the data held by them or the know-how to protect data. Most users perceive a false sense of security once they install an anti-virus or anti spam solution. That’s why along with providing security solutions, we look to educate our customers on the various current and evolving security threats that take place and how to be immune from them.” said Govind Rammurthy CEO, MicroWorld.