Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 27

MALICIOUS ATTACKS, THREATS, AND VULNERABILITIES

MANAGEMENT INFORMATION SYSTEM


BSBA 3-A
REPORTER’S
ANGELICA HAGAD
PowerPoint Editor
REPORTER’S

DHAVEVORAH LAPUZ
Video Editor
REPORTER’S

ALESSANDRA RAMOS
What is malicious attacks?
Types of malicious attacks
REPORTER’S

CAMELLA TABARANZA
Common Terms
REPORTER’S

BETHYMAE GERODIAS
Best Practice Against Malware
Define Vulnerabilities
REPORTER’S

NICOLE LAURESTA
Security Policy Vulnerabilities
REPORTER’S

MARGIE MENCIANO
Technology Vulnerabilities
Configuration Vulnerabilities
REPORTER’S

MARJORY LAYNESA
Threats
Structured And Unstructured threats
REPORTER’S

MAY ANN TEJANO


External and Internal Threats
A toOBJECTIVES
B - Timeline 5
 DEFINE MALICIOUS ATTACKS
 DEFINE VULNERABILITIES
 TYPES OF MALICIOUS
 PRIMARY
ATTACKS(MALWARE ATTACKS
 BEST PRACTICE AGAINST VULNERABILITIES IN
MALWARE ATTACK NETWORK

 DEFINE THREATS
 CLASSES OF THREATS
 COMMON TERM
BEST PRACTICE AGAINST MALWARE ATTACKS
COMMON TERMS

You might also like