![]() That evening the soldiers left the horse, opened the city gates, and let their fellow attackers into the city. Unbeknownst to them, several soldiers were hidden inside the horse. The next morning the residents of Troy saw the horse and assumed it to be a gift, so they rolled the wooden horse into the city. The attackers could not gain entrance, so they constructed a huge wooden horse and one night left it in front of the gates of Troy. The city of Troy was besieged for an extended period of time. The Trojan horse gets its name from an ancient tale. Some viruses don’t actually harm the system itself, but almost all of them cause network slowdowns due to the heavy network traffic caused by virus replication. The most common method for spreading a virus is using the victim’s email account to spread the virus to everyone in his address book. A computer virus is similar to a biological virus both are designed to replicate and spread. The key characteristic of a computer virus is that it self-replicates. We still think primarily of computer viruses when we think of malware. Like the human flu, it interferes with normal functioning.” 3 Hostile, intrusive, and intentionally nasty, malware seeks to invade, damage, or disable computers, computer systems, networks, tablets, and mobile devices, often by taking partial control over a device’s operations. Malware, or “malicious software,” is an umbrella term that describes any malicious program or code that is harmful to systems. One could also include rootkits in the malware category, but these usually spread as viruses and thus are regarded as simply a specific type of virus. Trojan horses and viruses are the most widely encountered. This section discusses four types of malware: viruses, Trojan horses, spyware, and logic bombs. Malware is a generic term for software that has a malicious purpose. Later chapters go into greater detail on each specific attack, how it is accomplished, and how to avoid it. This section offers a broad description of each type of attack. ![]() The foregoing list is just an attempt to provide a broad categorization of attack types. There are other attacks, such as social engineering. Insider threats: These are breaches based on someone who has access to your network misusing his access to steal data or compromise security.ĭNS poisoning: This type of attack seeks to compromise a DNS server so that users can be redirected to malicious websites, including phishing websites. Session hijacking: These attacks are rather advanced and involve an attacker attempting to take over a session. Two of the most common such attacks are SQL injection and cross-site scripting. Web attacks: This is any attack that attempts to breach your website. And, as you will see in later chapters, this includes distributed denial of service (DDoS). This includes cracking passwords, elevating privileges, breaking into a server…all the things you probably associate with the term hacking.ĭoS attacks: These are designed to prevent legitimate access to your system. Security breaches: This group of attacks includes any attempt to gain unauthorized access to your system. One reason the relatively generic term malware is now widely used is that many times a piece of malware does not fit neatly into one of these categories. This is the most prevalent danger to your system. It includes virus attacks, worms, adware, Trojan horses, and spyware. Malware: This is a generic term for software that has a malicious purpose. Most attacks can be categorized as one of seven broad classes: In this section we will examine threats that have been divided into categories based on the nature of the attack. Various sources have divided threats into different categories based on specific criteria. Some threats are common to all networks others are more likely with specific types of networks. Learn More Buy Identifying Types of ThreatsĪs discussed in the previous section, identifying your threats is a key part of risk assessment. Computer Security Fundamentals, 4th Edition
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |