SlideShare a Scribd company logo
9 Security
Threats
Everyone
Should Be
Aware Of
Advancement in cloud technology and
usage of internet often comes with security risk
associate with it.
So here is the list of top security
threats that you must be aware of so that you
can take essential security measures to
ensure integrity, confidentiality, and
availability of the information.
Security threats are classified into three
categories:
- Environmental
- Technological
- Human-factor
ENVIRONMENTAL
These threats are non-
malicious but can be caused
by natural phenomena such as
fire, flood, earthquakes,
hurricanes, and other natural
disasters.
TECHNOLOGICAL
These threats are caused due
to hardware failure, outdated
software and hardware, or
other reasons like power
failure.
HUMAN-FACTOR
Malicious or non-malicious
human agents cause these
threats. Some of these
threats are result of errors,
corruption or misuse of
information. These threats
are also known as cyber
attacks.
TYPES OF CYBER ATTACKS
This attack is carried out by unwanted
applications that are installed on the
end user's system. Some of the
prevalent malware attacks are worms,
virus, ransomware, trojan horse,
spyware, rootkit etc.
Also know as DDoS, in this attack
multiple compromised computer
attack the target server, website, or
network resource, which causes a
denial of service.
DISTRIBUTED DENIAL OF
SERVICE
This attack is carried out by the
fraudulent mail which tricks the victim
that the message is from the company or
individual they wanted to hear back like
request from the bank or note from the
company. It is in the form of a
attachment or link to a malicious
site.
PHISHING ATTACK
MALWARE ATTACK
MAN IN THE MIDDLE
ATTACK
This malware hides on your device
and eat up the computer resource to
mine cryptocurrencies like bitcoins.
Cybercriminal uses two approaches
to decode the password:
a) Brute Force: Trying out common
words, number related to persons'
info.
b) Dictionary Attack: Trying out
commonly used passwords like
123467, passwords, etc.
PASSWORD ATTACK In this attack, the attacker relays
and alter the communication
between two parties. The hacker
tricks the system into believing that
he is an authorized user.
CRYPTOJACKING ATTACK
Want to know more? Download the
complete E-Book for free!
9 Security Threats You Should Be
Aware Of
To know more visit
or call our Solutions Consultant at
1-855-ACE-IT-UP
www.acecloudhosting.com
About Us
Ace Cloud Hosting is a managed cloud
hosting provider and specializes in providing
cloud solutions for accounting, tax, retail,
and construction industries.
We host accounting applications on super-
fast and secure servers which are protected
by methods such as multi-factor
authentication, IDS/IPS, firewalls and
antivirus/anti-malware.
host accounting applications
Liked This Deck?
Check out some of the other slides on SlideShare.....
Follow us for more great content

More Related Content

9 Security Threats Everyone Should Be Aware Of

  • 2. Advancement in cloud technology and usage of internet often comes with security risk associate with it. So here is the list of top security threats that you must be aware of so that you can take essential security measures to ensure integrity, confidentiality, and availability of the information. Security threats are classified into three categories: - Environmental - Technological - Human-factor
  • 3. ENVIRONMENTAL These threats are non- malicious but can be caused by natural phenomena such as fire, flood, earthquakes, hurricanes, and other natural disasters.
  • 4. TECHNOLOGICAL These threats are caused due to hardware failure, outdated software and hardware, or other reasons like power failure.
  • 5. HUMAN-FACTOR Malicious or non-malicious human agents cause these threats. Some of these threats are result of errors, corruption or misuse of information. These threats are also known as cyber attacks.
  • 6. TYPES OF CYBER ATTACKS
  • 7. This attack is carried out by unwanted applications that are installed on the end user's system. Some of the prevalent malware attacks are worms, virus, ransomware, trojan horse, spyware, rootkit etc. Also know as DDoS, in this attack multiple compromised computer attack the target server, website, or network resource, which causes a denial of service. DISTRIBUTED DENIAL OF SERVICE This attack is carried out by the fraudulent mail which tricks the victim that the message is from the company or individual they wanted to hear back like request from the bank or note from the company. It is in the form of a attachment or link to a malicious site. PHISHING ATTACK MALWARE ATTACK
  • 8. MAN IN THE MIDDLE ATTACK This malware hides on your device and eat up the computer resource to mine cryptocurrencies like bitcoins. Cybercriminal uses two approaches to decode the password: a) Brute Force: Trying out common words, number related to persons' info. b) Dictionary Attack: Trying out commonly used passwords like 123467, passwords, etc. PASSWORD ATTACK In this attack, the attacker relays and alter the communication between two parties. The hacker tricks the system into believing that he is an authorized user. CRYPTOJACKING ATTACK
  • 9. Want to know more? Download the complete E-Book for free! 9 Security Threats You Should Be Aware Of
  • 10. To know more visit or call our Solutions Consultant at 1-855-ACE-IT-UP www.acecloudhosting.com About Us Ace Cloud Hosting is a managed cloud hosting provider and specializes in providing cloud solutions for accounting, tax, retail, and construction industries. We host accounting applications on super- fast and secure servers which are protected by methods such as multi-factor authentication, IDS/IPS, firewalls and antivirus/anti-malware. host accounting applications
  • 11. Liked This Deck? Check out some of the other slides on SlideShare..... Follow us for more great content