Networking and Internet Security Attacks PDF
Document Details
Uploaded by HeartfeltIolite
Dr. M. Tanvir Afzal
Tags
Summary
This presentation discusses various forms of security attacks targeting computer systems and the internet, including viruses, worms, Trojan horses, spyware, phishing, denial-of-service (DoS) attacks, and spam. It details how each attack type functions and its potential impact. The presentation is valuable for understanding common security threats.
Full Transcript
Networking and the Internet Security (Forms of Attacks) Dr. M. Tanvir Afzal Security (Forms of Attacks) Attacks Computer Systems and its contents can be attacked by many ways Many of these incorporates the...
Networking and the Internet Security (Forms of Attacks) Dr. M. Tanvir Afzal Security (Forms of Attacks) Attacks Computer Systems and its contents can be attacked by many ways Many of these incorporates the Malicious Software (Malware) 2 Security (Forms of Attacks) Malicious Software Types Viruses Worms Trojan Horses Spyware 3 Security (Forms of Attacks) Virus A virus is software that infects a computer by inserting itself into program that already reside in the machine. When host is executed, virus also executed. Degrading portions of OS, erasing large blocks of mass storage, 4 corrupting data and other programs Security (Forms of Attacks) Worms A worm is an autonomous program that transfers itself through a network, taking up residence in computers and forwarding copies of itself to other computers. 5 Security (Forms of Attacks) Trojan Horse A Trojan horse is a program that enters a computer system disguised as a desirable program, such as a game or useful utility package, that is willingly imported by the victim. Starts immediate or wait for some event, Normally transferred using email attachments. 6 Security (Forms of Attacks) Spyware Sniffing Software. collects information about activities at the computer on which it resides and reports that information back to the instigator of the attack. Companies use to make customer profile. Searching passwords and credit card numbers 7 Security (Forms of Attacks) Phishing Unlike spyware asking explicitly the required information normally using an email from so-called Government, law- enforcement agency, financial institute, etc 8 Security (Forms of Attacks) Denial of Service (DOS) attacks process of overloading a computer with messages an attacker usually plants software on numerous unsuspecting computers (botnet) that will generate messages when a signal is given. 9 Security (Forms of Attacks) Spam Unwanted Junk emails. Medium for phishing and Trojan horses. 1 Summary Security (Forms of Attacks) Viruses Worms Trojan Horses Spyware Phishing DOS 1 SPAM