Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

Computer Security Threats

Computer Science
Objectives

• Identify types of security threats


• Differentiate between the severity of threats
• Examine differing attack vectors of threats
• State common steps to thwart differing threats

2
Malware

• What is malware?
• Is there “legitimate” malware?
Adware
• Serving up unwanted advretisements
Spam
Virus or Worm
Trojan Horse
Rootkits and Botnets
Vectors

• Network Vulnerabilities
Vectors

• Phishing/Spear phishing
Social Engineering

You might also like