2. Attacks
Security (Forms of Attacks)
๏ผComputer Systems and its
contents can be attacked by
many ways
๏ผMany of these incorporates the
Malicious Software (Malware)
4. Virus
๏ผA virus is software that infects a
computer by inserting itself into
program that already reside in
the machine.
๏ผWhen host is executed, virus
also executed.
๏ผDegrading portions of OS,
erasing large blocks of mass
storage, corrupting data and
Security (Forms of Attacks)
5. Worms
A worm is an autonomous
program that transfers itself
through a network, taking up
residence in computers and
forwarding copies of itself to
other computers.
Security (Forms of Attacks)
6. Trojan Horse
A Trojan horse is a program that
enters a computer system disguised
as a desirable program, such as a
game or useful utility package, that
is willingly imported by the victim.
Starts immediate or wait for some
event,
Normally transferred using email
attachments.
Security (Forms of Attacks)
7. Spyware
๏ผ Sniffing Software.
collects information about activities at
the computer
on which it resides and reports that
information back to the instigator of the
attack.
๏ผ Companies use to make customer
profile.
๏ผ Searching passwords and credit card
numbers
Security (Forms of Attacks)
8. Phishing
๏ผUnlike spyware asking explicitly
the required information normally
using an email from so-called
Government, law-enforcement
agency, financial institute, etc
Security (Forms of Attacks)
9. Denial of Service (DOS) attacks
๏ผprocess of overloading a
computer with messages
๏ผan attacker usually plants
software on numerous
unsuspecting computers (botnet)
that will generate messages when
a signal is given.
Security (Forms of Attacks)