Professional Documents
Culture Documents
(Prelim Reviewer) Information Assurance and Security Ii
(Prelim Reviewer) Information Assurance and Security Ii
(Prelim Reviewer) Information Assurance and Security Ii
Keylogger: As the name suggests, a o Email Attachments: You can send files
keylogger records all keystrokes on a through emails. These files may be
keyboard. Most hackers use images, documents, audio, or videos.
keyloggers to get passwords and Attackers send you an email, and you are
account details. encouraged to open the attached file.
Shoulder surfing: The attackers
observe the user’s keyboard by
looking over the user’s shoulder.
Rainbow table: There are rainbow
tables that contain precomputed hash
values. Attackers use this table to find
the password of the user.
4. Email Attacks
o Phishing: The attacker sends bait, often
in the form of an email. It encourages
people to share their details. For
example, you receive an email like this:
5. Malware Attack
o Definitions:
Malware: This is a malicious program
or software that disrupts or damages
the computer.
Virus: A computer virus is a malicious
code that replicates by copying itself to
another program or document and
changes how a computer works. The
virus requires someone to knowingly or
unknowingly spread the infection
without the knowledge or permission of
o Spoofing: The attacker pretends to be a user or system administrator. An
another person or organization and example of a virus is the Melissa virus.
sends you an email stating that it is a Worms: These are standalone
legitimate email. programs that run independently and
infect systems. For example,
W32.Alcra.F is a worm that propagates
through network share devices.
Trojan Horse
o Functions of Malware:
Overwhelming system resources:
Malware, especially worms, can spread
around and overwhelm a system or
network. Some malware creates so
many folders that no memory is left and
slows a computer down.
Creating a backdoor: Let’s look at an
example: Microsoft sends updates
Rogationist College (St. Anthony’s Boys Village Inc) Fourth Year – First Semester
Neal Andreev S. Roderno, BSIT-701 ITP74 – INFORMATION ASSURANCE AND SECURITY
Software Protection
Constant Updates
Employee Education
Regular Backups
User Accounts