Page 1
Types of Attacks
Page 2
VIRUS
Page 3
A virus is a piece of programming code that causes some unexpected and usually undesirable event
Page 4
F i l e i n f e c t o r s
Virus Types
Page 5
File infectors
Page 6
- replicate by inserting themselves into executable files. Usually, the virus code is written at the beginning of a targeted file, so it is executed immediately, or appended to the end.
Page 7
Partition-sector infectors
Page 8
contaminate the partition record of a hard disk. The virus copies and stores the whole partition sector somewhere else on the hard disk.
-
Page 9
Boot-sector viruses
Page 10
infect both floppy diskettes and hard disks by changing or replacing the bootsector program with a copy of itself.
-
Page 11
Companion Virus
Page 12
searches for executable programs with the .exe or .bat extension and creates a copy of itself with the same name but a .com extension.
-
Page 13
Macro Viruses
Page 14
- infect an applications document files. The virus contains a set of application-specific macro commands that automatically execute in an unsolicited manner and then spread to the applications documents.
Page 15
Worms
Page 16
Worms are harmful programs that reside in the active memory of the computer and duplicate themselves. They can propagate without human intervention.
Page 17
Trojan Horse
Page 18
A Trojan horse is a program or routine concealed in software that appears to be harmless. They may contain or include a worm or virus as part of the package.
Page 19
Page 20
A denial-of-service attack is one which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
Page 21
Perpetrators
Page 22
Hackers test the limitations of systems out of intellectual curiosity to see whether they can gain access and how far they can go.
Page 23
- Crackers break into other peoples networks and systems, deface Web pages, crash computers, spread harmful programs, and write scripts and automated program that let other people do the same things.
Page 24
Malicious Insiders
Insiders are not necessarily employees; they can be consultants as well. Their risk tolerance ranges from low to high, depending on whether they are motivated by financial gain, revenge on their employers or publicity.
Page 25
Industrial Spies
Industrial spies use illegal means to obtain trade secrets from competitors of the firm. Competitive intelligence uses legal information gathering techniques to obtain
Page 26
Cybercriminals
They hack into corporate computers and steal money, often by transferring money from one account to another.Leaving a hopeless complicated trail for law enforcement officer to follow.
Page 27
Cyber terrorists
They intimidate or coerce a government or organization to advance his or her political or social objectives by launching computer based attack against computers, network, and the information stored on them.
Page 28
Page 29