EXERCISE
Describe the following threats, explain how it works and give an example:
Describe how to prevent such threats.
VIRUS:
- A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document.
- How it works?
Stealing passwords or data, logging keystrokes, corrupting files, spamming your email contacts and even taking over your machine are just some of the devastating irritating things a virus can do.
- How to prevent?
By downloading and always updating a security software to keeps you protected from existing, new and even yet to be invented threats.
- Example: File infects.
TROJAN HORSE:
- A trojan horse is a program that appears harmless but is in fact malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle are strong indications that a Trojan is residing on a computer.
- How it works?
A Trojan horse is not able to replicate itself nor can it propagate without an end user's assistance. This attacker must use social engineering tactics to trick the end user into executing the Trojan.
- How to prevent?
Users should keep their antivirus software up to date and never click on links from untrusted sources or download files from unknown senders.
- Example: The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment. Because nothing bad happens and the computer continues to work as expected, the victim does not suspect that the attachment is actually a Trojan horse and his computing device is now infected.
WORMS:
- A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining active on infected systems.
- How it work?
A computer worm infection spreads without user interaction, all that is necessary is for the computer worm to become active on an infected system.
- How to prevent?
Using firewalls will help reduce access to systems bu malicious software while using antivirus software will help in preventing malicious software from running.
- Example: Email worms spread by creating and sending outbound messages to all the addresses in a user's contacts list.
DOS ATTACK:
- A denial-of-service attack is a security event that occurs when an attacker takes action that prevents legitimate users from accessing targeted computer systems, devices or other network resources.
- How it work?
Preventing a particular individual from accessing a service.
- How to prevent?
By installing anti malware software.
- Example: Flooding the network to prevent legitimate network traffic.
REFERENCES:
No comments:
Post a Comment