Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Malicious Damage

No description
by

tom higgins

on 19 September 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Malicious Damage

Malicious damage is when a hardware or software has been attacked and has been harmed in a variety of ways, such as corruption, device problems and data compromise. Malicious Damage This is when the attack has been made on the victim directly, the virus could have been transferred to the victim via email affecting his PC only. Internal damage is maliciously intended to cause the victim harm. Internal damage Access Causing Damage Access causing damage is when the virus has been targeted at specific programs often preventing them from opening or redirecting you to another service. This kind of attack is often done to your internet browser and will cause you to be flooded with advertising when trying to access the internet or it will act like a firewall and block your internet all together. An example of this kind of virus would be a pathogen. External damage This is when the attack has been made to a external source and having a knock on affect to the victim , a denial of service attack(or Ddos) on the telephone company BT would be an example of when an outside source has maliciously attacked and the affects would be on the victim as his internet would go down. Access without damage This sort of malicious attack is where damage is not caused this can be something simple as a pop-up advertisement and example of this kind of a attack would be the Ana Worm, this is an image that is spread through email, it simply sends itself to your address book but causes no real damage. Counterfeit goods are usually known as knock offs or fakes, they are goods that are copied and sold off as originals. These goods cause a threat if you are selling them as you can be fined for breaking many different laws such as copyright. They are also a threat to the original manufacturer and seller of the products as the prices of the fakes are often much cheaper (as they are of poorer quality) meaning customers often prefer to buy them.

Software is often "Pirated" which is a word for counterfeit, this is usually downloaded via torrents or peer to peer programs such as Lime wire. This has a massive effect on the owners of the software as the pirated versions are distubuted for free. Counterfeit Goods Technical failures is where thing go wrong with the equipment that you are using, both hardware and software. Human error is also a technical failure as it affects the data that is being inputted. Technical Failures A website defacement is the substitution of the original page by a system hacker that breaks into a web server and alters the hosted website creating one of their own. Website Defacement Control of access to data is where the access to the data has been compromised for example a DDos attack send numerous connections to the host of a website in order to overload the bandwidth causing the website to slow or become unresponsive. the effects of this can be small and simply be that the website slows down for a few moments then resumes later on. It can have more serious implications such as taking the website down meaning the business loses trade. Control Of Access To Data There are many different products that are counterfeited, nearly anything that you can buy from a retail store will be counterfeited. The major market is in pirated media, this includes DVD's, software, music and games. They can be counterfeited in two different ways, they can be physical or digital.

Counterfeit physical media will often be distributed at markets and car boot sales, generally the will small private sellers that burn the media onto discs and sell them at any available sales event.
Counterfeit digital media is distributed via the internet, either using P2P programs such as lime wire or bear share or torrents downloaded from websites like Pirate Bay and ISOhunt. Counterfeit Goods At Risk This is the effects that these attack cause on organisations. they can range from small insignificant damages to large company threatening effects. Low rating damages would be loss/delay of service, this is where the attack simply stops the company from working for a certain period of time, this can have a loss of income but the business should be swiftly back to operation.

A more serious impact would be loss of data and corruption, this can cause the whole business to halt.trading and it can be a long time before full systems are back to full order. Organisational impact There are many laws that require the information you hold to be secure. the reason data and information must be kept secure is not just to abide by the law but the confidentiality of the customers is important. Unless the customer has gave permissions for you to pass the information on to others you cannot do so. This also means that you have to ward of the threat of hackers as they will steal the information and distribute it illegally.

Also you have to ensure that there are systems in place to ensure the integrity of the data. This means that the data imputed is correct and valid for what you are holding it for. If the data has been compromised then its integrity will not be in order meaning it wont be correct. Information security FIN.
Full transcript