Deliberate software attacks occur when an individual or group designs and deploys software to attack a system.
This attack an consist of specially crafted software that attackers trick users into installing on their systems.
This software is used to overwhelm the processing capabilities of online system or to gain access to protected systems by hidden .
3. Deliberate software attacks
Deliberate software attacks occur when an
individual or group designs and deploys software to
attack a system.
This attack an consist of specially crafted software
that attackers trick users into installing on their
systems.
This software is used to overwhelm the processing
capabilities of online system or to gain access to
protected systems by hidden .
3
4. Malware
“Malware is reffered to
as Malicious Code or
Malicious Software”.
“ Malicious Software
programs are designed
to damage, destroy”.
4
6. Virus
✘ A computer virus consists of code segments that
perform malicious actions.
✘ The virus controlled targeted program carries a
virus plan by replicating itself into additional
targeted systems.
✘ The current software such as Symantec Norton
AntiVirus, Kaspersky AntiVirus, AVG
AntiVirus and McAfee VirusScan.
6
7. Virus
✘ The Macro Virus, which is embedded in
automatically executing macro code used by
word processors, spreadsheets.
✘ The Boot Virus, which infects the key
operating system files in a computer’s boot
sector.
✘ Viruses are classified as Memory-resident
viruses or Non-memory-resident viruses.
7
8. 8
Worms
Worms can continue replicating themselves
until they completely fill available resources,
Such as memory, hard drive space, and
network bandwidth.
Code Red, Sircam, Nimda and KleZ are
examples of class of worms. E-mail contains
the Nimda and Sircam worms.
The KleZ worm delivers a double-barreled
payload that contain the worm to deliver a
macro virus.
9. Trojan Horses
Trojan Horses are
frequently desguised as
helpful, interesting, or pieces
of software.
Trojan Horses are brought
into a system, they become
activated and can wreak
havoc on the unsuspecting
user.
9
12. Virus ans Worm hoaxes
♦Virus and Worms perhaps more time and money are spent resolving
virus hoaxes.
♦A computer VIRUS is a type of computer program that, when
executed, replicates itself and insets its own code, ultimately affecting
the functioning of the computer.
♦A computer WORM is a type of malware that spread itself from
computer to computer by replicating itself without any human
interaction.
♦One of the most Prominent virus hoaxes was the 1994 “Good Times”
12
13. ☻A back door is also an intentional access control bypass
left by a system designer to facilitate development.
☻A newly discovered access mechanism, an attacker can
gain access to a system or network resource through a back
door.
☻A back door/ Trap door component in a system,
allowing the attacker to access the system with special
privileges.
☻ Sometimes these doors are left behind by system
designers or maintenance staff such as door is referred to as
a maintenance hook.
Back Doors
13
14. Denial-of-Service(DOS)
An attack that attempts to overwhwlm a
computer target’s ability to handle incoming
communications, prohibiting legitimate users
from accessing those systems.
In a denial of service attack, a hacker
comprises a system and uses that system to
attack the target computer, flooding it with more
requests for service than the target can handle.
14
15. Distributed Denial-of-Service
♦ A DOS attack in which a coordinated stream of requests is launched
againsta target from many locations at the same time using bots or zoombies.
♦In a distributed denial-of-service attack, dozens or even hundreds of
computers are compromised, loaded with DOS attack software, and then
remotely activated by the hacker to conduct a coordinated attack
15
16. Man in the Middle
An attacker monitors packets from the network,
modifies them, and inserts them back into the network.
In a TCP hijacking attack, also known as Session
hijacking, the attacker uses address spoofing to
impersonate other legitimate entities on the network.
16