Cyber Attack

Information about Cyber Attack

Published on July 22, 2014

Author: nishantyadav50



Virus : Virus A  computer virus  is a computer program that can replicate itself and spread from one computer to another. The virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. Like humans, even computer virus have a variety. some virus may cause only mildly annoying effects while others can damage your hardware, software or files. People continue the spread of a computer virus mostly unknowingly by sharing infecting files or sending e-mails with viruses as attachments in the e-mail. Hacking: Hacking Hacking refers to the technique or process by which a hacker gains access to a computer system. Hacking may be for several reasons like for profit, protest, challenge or simply for fun. It deals with exploiting a weakness or vulnerability i.e. targeting loop holes in the computer system. There are different types of hackers such as 1) White Hat 2) Black Hat 3) Grey Hat 4) Elite Hacker 5) Script Kiddie 6) Neophyte 7) Blue Hat 8) Hacktivist Spam: Spam Spam is the use of electronic messaging systems to send unsolicited bulk messages, especially advertising via email. Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Most people class all unsolicited email as spam including automatic replies, emails containing viruses and unsolicited but legitimate business propositions which is broadly correct because spammers often use special techniques for some types of attacks. The spam block communication channels and email boxes. There are many types of spam like e-mail spam, instant messaging spam, newsgroup and forum, mobile phone spam, social networking spam, online game messaging spam and spamdexing. Phishing: Phishing Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing messages usually take the form of fake notifications from banks, providers, e-pay systems and other organizations. The notification will try to encourage a recipient, for one reason or another, to urgently enter/update their personal data. Such excuses usually relate to loss of data, system breakdown, etc. Worm: Worm A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. A worm is similar to a virus by design and is considered to be a sub-class of a virus, but unlike virus it has the capability to travel without any human action. Worms almost always cause at least some harm to the network, even if even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. Due to the copying nature of a worm and its capability to travel across networks Trojan: Trojan The Trojan Horse at first glance will appear to be useful software but actually do damage once installed or run on your computer. A Trojan horse , or Trojan , is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer. Trojan horses can make copies of themselves, steal information, or harm their host computer systems. Trojans do not reproduce by infecting other files nor do they self-reproduce. IP Spoofing : IP Spoofing IP Spoofing also known as IP address forgery or a host file hijack, is a hijacking technique in which a cracker masquerades or a trusted host to conceal his identity, spoof a Web site, hijack browsers or gain access to a network. The Hijackers obtains the IP address of a legitimate host and alters packet headers so that the legitimate host appears to be the source. The Hijacker could alter or steal sensitive data, such as a credit card number or password, or install malware. In IP Spoofing the goal is to flood the victim with overwhelming amounts of traffic, and the attacker does not care about receiving responses to the attack packets.

Related presentations