8. computer threats
-
Upload
siti-muhammed -
Category
Documents
-
view
463 -
download
7
description
Transcript of 8. computer threats
![Page 1: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/1.jpg)
INTRODUCTION TO ICT
COMPUTER THREATS
![Page 2: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/2.jpg)
PENGENALAN KEPADA ICT
ANCAMAN KOMPUTER
![Page 3: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/3.jpg)
INTRODUCTION COMPUTER THREATS
Computer threats can come from many ways either from human or natural disasters.
For example, when someone is stealing your account information from a trusted bank, this threat is considered as a human threat.
However, when your computer is soaked in heavy rain, then that is a natural disaster threat.
![Page 4: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/4.jpg)
PENGENALAN KEPADA ANCAMAN KOMPUTER
Ancaman komputer boleh datang dalam pelbagai kaedah samada dari manusia atau bencana semulajadi.
Sebagai contoh, apabila seseorang mencuri maklumat akaun anda daripada bank yang dipercayai, ancaman ini dipertimbangkan sebagai ancaman manusia.
Bagaimanapun, apabila komputer kamu terendam di dalam hujan lebat, ini dipertimbangkan sebagai ancaman bencana semulajadi.
![Page 5: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/5.jpg)
Computer Threats
![Page 6: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/6.jpg)
1
![Page 7: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/7.jpg)
MALICIOUS CODE
Malicious code is also known as a rogue program. It is a threat to computing assets by causing undesired effects in the programmer’s part. The effect is caused by an agent, with the intention to cause damage.
The agent for malicious code is the writer of the code, or any person who causes its distribution. There are various kinds of malicious code. They include virus, Trojan horse, logic door, trapdoor and backdoor, worm and many others.
![Page 8: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/8.jpg)
KOD MALICIOUS
Kod malicious juga dikenali sebagai program penyangak. Ia adalah ancaman kepada aset-aset komputer dengan menyebabkan kesan yang tidak diinginkan di dalam bahagian pengaturcara (program). Kesan ini disebabkan oleh satu ejen yang dengan niat untuk menyebabkan kerosakkan.
Ejen bagi kod malicious adalah penulis kod, atau orang lain yang menyebabkan pengedarannya. Terdapat pelbagai jenis kod malicious. Ia terdiri daripada virus, Trojan horse, logic door, trapdoor dan backdoor, worm dan banyak lagi.
![Page 9: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/9.jpg)
MALICIOUS CODE
a) VIRUSa program that can pass on the malicious code
to other programs by modifying themattaches itself to the program, usually files
with .doc, .xls and .exe extensionsdestroys or co-exists with the programcan overtake the entire computing system and
spread to other systems
![Page 10: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/10.jpg)
KOD MALICIOUS
a) VIRUS Program yang boleh menghantar kod malicious ke
program yang lain dengan mengubahsuainya. Menggabungkan dirinya dengan program lain,
selalunya dengan fail .doc, .xls dan .exe extensions Memusnahkan atau wujud bersama dengan program. Boleh mengambil alih keseluruhan sistem komputer
dan tersebar ke sistem komputer yang lain.
![Page 11: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/11.jpg)
MALICIOUS CODE
b) TROJAN HORSE a program which can perform useful and unexpected
action must be installed by users or intruders before it can
affect the system’s assets an example of a Trojan horse is the login script that
requests for users’ login ID and password the information is then used for malicious purposes
![Page 12: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/12.jpg)
KOD MALICIOUS
b) TROJAN HORSE Program yang boleh melaksanakan tindakan yang
berguna dan tidak dijangka. Mesti dipasang oleh pengguna atau penceroboh
sebelum ia boleh memberi kesan kepada sistem komputer.
Satu contoh bagi Trojan Horse adalah skrip log masuk yang meminta login ID dan kata laluan.
Maklumat ini kemudiannya digunakan bagi tujuan malicious (jahat).
![Page 13: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/13.jpg)
MALICIOUS CODE
c) LOGIC BOMBlogic bomb is a malicious code that goes off
when a specific condition occurs.an example of a logic bomb is the time bombit goes off and causes threats at a specified
time or date e.g. Friday the 13th and Michelangelo ( March 6th )
![Page 14: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/14.jpg)
KOD MALICIOUS
c) LOGIC BOMB logic bomb adalah kod malicious yang
beroperasi/terjadi apabila berada di dalam keadaan tertentu.
Satu contoh bagi logic bomb adalah time bomb. Ia terjadi dan menyebabkan ancaman pada masa atau
tarikh tertentu. cth. Friday the 13th and Michelangelo ( March 6th )
![Page 15: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/15.jpg)
MALICIOUS CODE
e) TRAPDOOR OR BACKDOOR Trapdoor is malicious code that open a back door
and allow other people to have unauthorized access to your computer over internet.
Also a feature in a program that allows someone to access the program with special privileges
f) WORM a program that copies and spreads itself through a
network
![Page 16: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/16.jpg)
KOD MALICIOUS
e) TRAPDOOR ATAU BACKDOOR Trapdoor adalah kod malicious yang membuka pintu
belakang dan membenarkan orang lain melakukan akses tanpa kebenaran terhadap komputer kamu menerusi internet.
Juga satu ciri di dalam program yang membenarkan seseorang memiliki akses kepada program dengan keistimewaan tertentu.
f) WORM Program yang boleh menyalin dan menyebar dirinya menerusi
sebuah rangkaian.
![Page 17: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/17.jpg)
Primary Differences Between Worms And viruses
Worm Virus
Operates through the network
Spreads through any medium
Spreads copies of itself as a standalone program
Spreads copies of itself as a program that attaches to other programs
![Page 18: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/18.jpg)
Perbezaan Utama Di Anatara Worm dan virus
Worm Virus
Beroperasi menerusi rangkaian.
Tersebar menerusi pelbagai medium.
Menyebarkan salinan dirinya sebagai program standalone (bersendirian)
Menyebarkan salinan dirinya sebagai program yang bergabung dengan program yang lain.
![Page 19: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/19.jpg)
Hacking refer to unauthorized access to the computer system by a hacker.
2
![Page 20: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/20.jpg)
Pengodaman merujuk kepada akses tanpa kebenaran terhadap sistem komputer oleh seorang pengodam.
2
![Page 21: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/21.jpg)
HACKING
Hacking is a source of threat to security in computer.
It is defined as unauthorised access to the computer system by a hacker.
Hackers are persons who learn about the computer system in detail. They write program referred to as hacks. Hackers may use a modem or cable to hack the targeted computers.
![Page 22: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/22.jpg)
PENGODAMAN Pengodaman adalah sumber bagi ancaman terhadap
keselamatan di dalam komputer. Ia ditakrifkan sebagai akses tanpa kebenaran terhadap
sistem komputer oleh seorang pengodam. Pengodam adalah seseorang yang mempelajari
berkaitan sistem komputer dengan lebih mendalam. Mereka menulis program yang bertujuan untuk mengodam. Pengodam mungkin menggunakan modem atau kabel untuk mengodam komputer sasarannya.
![Page 23: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/23.jpg)
3
![Page 24: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/24.jpg)
3
![Page 25: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/25.jpg)
NATURAL DISASTER
Computers are also threatened by natural or environmental disaster. Be it at home, stores, offices and also automobiles.
Examples of natural and environmental disasters:– Flood
– Fire
– Earthquakes, storms and tornados
– Excessive Heat
– Inadequate Power Supply
![Page 26: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/26.jpg)
BENCANA SEMULAJADI
Komputer juga diancam oleh bencana semulajadi atau persekitaran. Terjadi di rumah, stor, pejabat dan juga di kedai-kedai kereta.
Contoh bencana semulajadi dan persekitaran adalah:
– Banjir
– Kebakaran
– Gempabumi, ribut petir dan tornado
– Kepanasan yang keterlaluan
– Bekalan tenaga yang tidak mencukupi
![Page 27: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/27.jpg)
Computer is used to steal money and information.
Stealing of computers especially notebook and PDA.
4
![Page 28: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/28.jpg)
Komputer digunakan untuk mencuri duit dan maklumat.
Pencurian komputer terutamanya notebook dan PDA.
4
![Page 29: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/29.jpg)
THEFT Two types of computer theft:1) Computer is used to steal money, goods, information and
resources.2) Stealing of computer, especially notebook and PDAs.
Three approaches to prevent theft:1) prevent access by using locks, smart-card or password2) prevent portability by restricting the hardware from being
moved3) detect and guard all exits and record any hardware transported
![Page 30: 8. computer threats](https://reader030.fdocuments.us/reader030/viewer/2022020122/54801568b4af9fb25a8b46bb/html5/thumbnails/30.jpg)
KECURIAN Dua jenis kecurian komputer:1) Komputer digunakan untuk mencuri duit, barang, maklumat
dan sumber-sumber.2) Pencurian komputer terutamanya notebook dan PDA.
Tida pendekatan bagi mencegah kecurian:1) Mencegah akses dengan menggunakan pengunci, smart-card
atau kata laluan.2) Mencegah pergerakkan dengan menghadkan perkakasan
daripada dipindahkan.3) Kesan dan lindungi semua keluaran dan rekod perkakasan
yang diangkut.