Virus.: A Computer Virus Is A Computer Program That Can Copy Itself and Infect A Computer

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 25

Virus.

A computer virus is a computer program that can copy itself and infect a computer.

EMAIL VIRUSES

BOOT VIRUSES

MACRO VIRUSES

VIRUSES

FILE VIRUSES

STEALTH VIRUSES

POLYMORPHIC VIRUSES

Worms
A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention.

ROBERT TAPPAN MORRIS

TYPES OF WORMS
Email Worms

Instant Messaging Worms

WORMS
Internet Worms

IRC Worms

File-Sharing Network Worms

Phishing
Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

F baction . Net

Guessing passwords
Another common attack is to guess a user's password. This style of attack is manual or automated. Manual attacks are laborious, and only successful if the attacker knows something about the shopper.

A Strong password policy can be as follows.. Must contain at least 7 characters.. Must contain at least single uppercase letter Must contain at least single lowercase letter Must contain at least single digit Must contain at least single special characters

Tricking the shopper


Some of the easiest and most profitable attacks are based on tricking the shopper, also known as social engineering techniques. These attacks involve surveillance of the shopper's behavior, gathering information to use against the shopper.

Sniffing the network


In this scheme, the attacker monitors the data between the shopper's computer and the server. He collects data about the shopper or steals personal information, such as credit card numbers.

Using denial of service attacks


The denial of service attack is one of the best examples of impacting site availability. It involves getting the server to perform a large number of mundane tasks, exceeding the capacity of the server to cope with any other task.

USING KNOWN SERVER BUGS


The attacker analyzes the site to find what types of software are used on the site. He then proceeds to find what patches were issued for the software. Additionally, he searches on how to exploit a system without the patch. He proceeds to try each of the exploits.

You might also like