Networking and Internet Security Attacks PDF

Summary

This presentation discusses various forms of security attacks targeting computer systems and the internet, including viruses, worms, Trojan horses, spyware, phishing, denial-of-service (DoS) attacks, and spam. It details how each attack type functions and its potential impact. The presentation is valuable for understanding common security threats.

Full Transcript

Networking and the Internet Security (Forms of Attacks) Dr. M. Tanvir Afzal Security (Forms of Attacks) Attacks Computer Systems and its contents can be attacked by many ways Many of these incorporates the...

Networking and the Internet Security (Forms of Attacks) Dr. M. Tanvir Afzal Security (Forms of Attacks) Attacks Computer Systems and its contents can be attacked by many ways Many of these incorporates the Malicious Software (Malware) 2 Security (Forms of Attacks) Malicious Software Types Viruses Worms Trojan Horses Spyware 3 Security (Forms of Attacks) Virus A virus is software that infects a computer by inserting itself into program that already reside in the machine. When host is executed, virus also executed. Degrading portions of OS, erasing large blocks of mass storage, 4 corrupting data and other programs Security (Forms of Attacks) Worms A worm is an autonomous program that transfers itself through a network, taking up residence in computers and forwarding copies of itself to other computers. 5 Security (Forms of Attacks) Trojan Horse A Trojan horse is a program that enters a computer system disguised as a desirable program, such as a game or useful utility package, that is willingly imported by the victim. Starts immediate or wait for some event, Normally transferred using email attachments. 6 Security (Forms of Attacks) Spyware  Sniffing Software. collects information about activities at the computer on which it resides and reports that information back to the instigator of the attack.  Companies use to make customer profile.  Searching passwords and credit card numbers 7 Security (Forms of Attacks) Phishing Unlike spyware asking explicitly the required information normally using an email from so-called Government, law- enforcement agency, financial institute, etc 8 Security (Forms of Attacks) Denial of Service (DOS) attacks process of overloading a computer with messages an attacker usually plants software on numerous unsuspecting computers (botnet) that will generate messages when a signal is given. 9 Security (Forms of Attacks) Spam Unwanted Junk emails. Medium for phishing and Trojan horses. 1 Summary Security (Forms of Attacks) Viruses Worms Trojan Horses Spyware Phishing DOS 1 SPAM

Use Quizgecko on...
Browser
Browser