1 / 8

Information Technology Threat slideshare

Buy Original A Papers At Affordable Prices at http://www.writemywriting.com/. Our writers are MA and Phd certified with vast experience in writing academic papers for all academic levels.Our customers private information is sacred. Your association with us will always remain anonymous.Contact us today to enjoy our services to your satsfaction.

Edwinsydney
Download Presentation

Information Technology Threat slideshare

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Technology Threat Presented by: http://writemywriting.com/

  2. Introduction • Threat is any event or circumstance resulting in adverse effects through the information system • Computer threats result in destruction, modification, disclosure http://writemywriting.com/

  3. Damage Caused by Trojan • Trojan performs desirable functions but facilitates unauthorized access to one’s computer. • Uses downloads or online materials to get into the computers . • Usually, they present themselves as harmless programs or games http://writemywriting.com/

  4. Can modify or delete crucial information in the computers. • Facilitates electronic funds and data theft • Crash computers or making them operate at slow paces. http://writemywriting.com/

  5. Trojans spreads botnet and distributes the denial-of –service attacks. • Hackers can control computers, which have Trojan remotely http://writemywriting.com/

  6. Prevention and Removal • Caution should be taken while opening the .exe files • Use of firewalls • Use up- to-date Anti-virus software http://writemywriting.com/

  7. Conclusion • Exercise caution when dealing with cases of computer threats. • Reliable anti-virus software can easily detect Trojans • Trojans are non-replicating. http://writemywriting.com/

  8. Visit http://writemywriting.com/ For more information on Information Technology Threat

More Related