Sie sind auf Seite 1von 3

Security Threats:

Operating system's processes and kernel do the designated task as instructed.


If a user program made these process do malicious tasks ( intended to do harm.) then it is
known as Program Threats.
One of the common example of program threat is a program installed in a computer
which can store and send user credentials via network to some hacker.
Following is the list of some well-known program threats.

Trojan Horse
Such program traps user login credentials and stores them to send to malicious user who
can later on login to computer and can access system resources.
A Trojan horse or Trojan is a type of software.
Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive
data, Deleting data, Blocking data, Modifying data, Copying data and gain backdoor
access to your system.
Unlike computer viruses and worms , Trojans are not able to self-replicate.
A backdoor Trojan gives malicious users remote control over the infected computer.
They enable the author to do anything they wish on the infected computer including
sending, receiving, launching, and deleting files, displaying data, and rebooting the
computer.
It enters a computer system through an email- or free programs that have been
downloaded from the internet . once lodged in the computer , it may allow unauthorized
users to access the information stored in computer.

EX : In computing, a Trojan horse is a program that appears harmless, but is, in fact,
malicious. The term comes from Greek mythology about the Trojan War.
According to legend, the Greeks built a large wooden horse that the people of Troy
pulled into the city. During the night, soldiers who had been hiding inside the horse
emerged, opened the city's gates to let their fellow soldiers in and then overran the city.
Attackers have long used Trojan horses as a way to trick end users into
installing malware. Typically, the malicious programming is hidden within an innocent-
looking email attachment or free program, such as a game.
When the user downloads the Trojan horse, the malware that is hidden inside is also
downloaded. Once inside the computing device, the malicious code can execute whatever
task the attacker designed it to carry out.

Virus

Virus as name suggest is a type of malicious software program ("malware") that can
replicate themselves on computer system (copying its own source code) or infecting
other computer programs by modifying them. They are highly dangerous and can
modify/delete user files, crash systems.
A virus is generatlly a small code embedded in a program. As user accesses the
program, the virus starts getting embedded in other files/ programs and can make system
unusable for user.
virus is dangerous because it will quickly use all available memory and bring
the system to a halt and also capable of transmitting itself across networks and
bypassing security systems.
A virus can be spread by opening an email attachment, clicking on an executable file,
visiting an infected website or viewing an infected website advertisement. It can also be
spread through infected removable storage devices, such USB drives.
Once a virus has infected the host, it can infect other system software or resources,
modify or disable core functions or applications, as well as copy, delete or encrypt data.
Some viruses begin replicating as soon as they infect the host, while other viruses will lie
dormant until a specific trigger causes malicious code to be executed by the device or
system.

Spyware

Spyware is a type of malware that is installed on a computer without the knowledge of


the owner in order to collect the owner's private information.
Spyware is often hidden from the user in order to gather information about internet
interaction, keystrokes (also known as keylogging), passwords, and other valuable data.
spyware is generally loosely defined as software thats designed to gather data from a
computer or other device and forward it to a third party without the consent or knowledge
of the user.
This often includes collecting confidential data such as passwords, PINs and credit card
numbers, monitoring keyword strokes, tracking browsing habits and harvesting email
addresses.
In addition to all of this, such activities also affect network performance, slowing down
the system and affecting the whole business process.
Adware: - Generically adware is a software application in which advertising banners are
displayed while any program is running. Adware can automatically get downloaded to
your system while browsing any website and can be viewed through pop-up windows or
through a bar that appears on a computer screen automatically. Adwares are used by
companies for marketing purpose.
Spyware works like adware but is usually a separate program that is installed
unknowingly when you install another freeware type program or application.

Hackers:

Hacker is a term used by some to mean "a clever programmer" and by others, especially
those in popular media, to mean "someone who tries to break into computer systems."
Means, it describes as any individual who illegally breaks into computer systems to
damage or steal information.
Most computer hackers hack because of curiosity, to bypass restrictions, or to test their
computer abilities. Other reasons can include hacking for profit, revenge, and destruction.

Types of hackers:
o Ethical Hacker (White hat):
A hacker who gains access to systems with a view to fix the identified weaknesses. They
may also perform penetration testing and vulnerability assessments.
They are the ethical hackers, experts in compromising computer security systems who
use their abilities for good, ethical, and legal purposes rather than bad, unethical, and
criminal purposes.
For example, many white-hat hackers are employed to test an organizations computer
security systems.
the white-hat hacker reports back to the organization and informs them of how they
gained access, allowing the organization to improve their defenses. This is known as
penetration testing,
Organization gives award prizes for revealing such discovered vulnerabilities,
compensating white-hats for their work.

Cracker (Black hat):

A hacker who gains unauthorized access to computer systems for personal gain.
The intent is usually to steal corporate data, violate privacy rights, transfer funds from
bank accounts etc.
Black-hat hackers violate computer security for personal gain (such as stealing credit
card numbers or harvesting personal data for sale to identity thieves) hackers are
criminals performing illegal activities for personal gain and attacking others. Theyre
the computer criminals

Phishing

Phishing email will typically direct the user to visit a website where they are asked to
update personal information, such as a password, credit card, social security, or bank
account numbers, that the legitimate organization already has.
Phishing is a form of fraud in which the attacker tries to learn information such as login
credentials or account information
Pronounced like fishing, phishing is a term used to describe a malicious individual or
group of individuals who scam users.
They do so by sending e-mails or creating web pages that are designed to collect an
individual's online bank, credit card, or other login information. Because these e-mails
and web pages look like legitimate companies users trust them and enter their personal
information.
To make phishing messages look like they are genuinely from a well-known company,
they include logos and other identifying information taken directly from that companys
website
Phishing is a homophone of fishing, which involves using lures to catch fish.

These security threats may result into loss of data confidentiality , data integrity . hense
system designer need to design mechanism that throw these attacks , such as installing
firewall to prevent unauthorized use of data , enabling anti-virus programs and keeping secret
eye on new program loaded into computer system.

Das könnte Ihnen auch gefallen