Preview

Malicious Attacks

Good Essays
Open Document
Open Document
921 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Malicious Attacks
Malicious attacks basically seek to exploit vulnerabilities in a network. These threats can be passive or active and have very negative consequences. The difference between active and passive attacks are that active attacks makes changes or modifications to the data or attempt to gain some type of access to the network, while passive attacks do not make changes to the system at all. According to Solomon, 2012, there are many malicious attacks and threats that can be carried out against the network, some of which are identified below:
- Brute force attacks are one of the most tried and true attack methods where the attacker uses a software program to try all possible combinations of a password, security code or user ID, until one of them is successful.
- Hijacking is another type of attack that involves the attacker taking control of a session between two machines and masquerades as one of them. This can involve man-in-the-middle, browser or session hijacking.
- Social engineering is another common attack where the attacker tricks the user in carrying out actions for them; for example, the attacker may obtain the user’s login credentials by posing as an IT Specialist which would then help the intruder gain access to the network.
- Computer viruses act like a biological virus, where it infects the host program and could cause the host program to replicate itself to other computers. Some of these viruses have become smarter with the capability to combat malware-detection programs by disabling their detection functions.
- Trojan horse is a malware program that masquerades as a useful program They use their outward appears to trick users into running them; they look like programs that perform useful tasks but actually hid malicious code.
- Rootkits are newer types of malware that modifies or replaces one or more existing programs to hide traces of attacks.
- Spyware is a type of malware that specifically threatens the confidentiality of information. It

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Trojan horse – A type of malware that cannot self-replicate, and appears to do one action, but instead infects the computer with malicious payloads.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3445 Unit 4 Lab

    • 556 Words
    • 2 Pages

    1 What is brute force attack and how can the risks of these attacks be mitigated.…

    • 556 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    First and for most this process I found out seems like a whole lot of hassle so I don’t understand why people would do this and just get caught in the end. But I will be listing 5 general phases of a computer attack that one would have to go through to be successful in other words jumping through hoops that are on fire.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Insiders have caused damage to networks being terminated or remain in a position to provide information to the outside. They can set up fake websites that look like a real product or supplier but are actually malicious sites designed to attack the computer and add malicious code to the key log, use contact lists, steal data, and other malicious purposes.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Virus is a kind of code created by human that can damage the whole system once it is been opened, and the trick that hackers use is that they send the virus in different way such as “junk email, pop-ups web pages or games. As soon as the user clicks on that particular email or pop-up the virus codes starts doing their job which is to damage the system by destroying files and other objects.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Bilingual Sestina Summary

    • 557 Words
    • 3 Pages

    The rhyme pattern “Bilingual The verse form “Bilingual Sestina” by Julia Alvarez lecture about the tactual sensation sensation you have when you have two whole new speech communication in your head. The spoken communication is about identity and a glimpse of what it’s like to be bilingualist, and blended at the same snip . Having to learn two linguistic summons, in two Polish are ultimately mixed together, changed on both position. For example “Gladys, I summon you vertebral column spinal anesthesia column with your given nombre”,appearance show a observation of lonely, hungriness feeling. Having Alvarez lace hr country and having to come to a whole new places it hard and not only that having to learning a second language.…

    • 557 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ethics

    • 916 Words
    • 4 Pages

    This technique involves identifying the source of the computers and their I.P. Addresses for which the hacker would like to compromise.…

    • 916 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Files have a way of building up and can quickly use up your disk space. If you…

    • 392 Words
    • 2 Pages
    Satisfactory Essays