Are We Safe! How a network can be attacked Types of attacks There are numerous types of attacks, some of these are: Virus A virus is a software program that is designed to replicate between computers and affect the operation of the computer. A computer virus is similar to a human virus. A virus is a software program that is able to corrupt and delete data from the computer. The virus can be transferred from one pc to another through an email as an attachment. Trojans A Trojan horse is a program or utility that looks as though it would be useful and safe to use but actually it is carrying out tasks which give others access to your computer. Trojans are usually found built in to another program so that it is not easily discovered. The Trojan will then run when the program that it is built into is running. Trojans are not easily discovered by antivirus software because they are written in to the code of another program. Worms A worm is another way how a network can be attacked, worms are very easy to spread between computers. Worms are transferred from one computer to another without human interaction. The worms can be transferred by emails, USB drives or downloading files. This means that worms have the capability to transfer from one computer to another and to replicate so they can infect vast amounts of computers. Adware Another way that a network can be attacked is Adware. Adware is a piece of software which generate advertisements (pop-ups, banners and
Computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user. Viruses perform some type of harmful activity such as accessing private information or corrupting
This type of attack is any event that diminishes or eliminates a network’s capacity to perform its expected function. These attacks are launched against server resources
Generally, the horse of Trojans is coded programs coded for the purpose of harming the computer devices which appears to be harm free, but when the code is executed by users, the data & file systems are corrupted leading to damaging the computer devices.
In this report I will be describing the ways in which networks can be attacked, also be giving real life example of each of the below.
A Virus is a piece of malicious code that has the intent to damage your system.
a type of virus that spreads itself, not only from file to file, but also from computer to computer. the primary difference between a virus and a worm is that a virus must attach to something. such as an executable file, in order to spread. worms do not need to attach to anything to spread and can tunnel themselves into computers.
Malware is a class of malicious code that incorporates viruses, worms, and Trojan horses. Specialized communication tools are used by destructive malwares in order to spread. Malwares could be distributed by means of email and texts, Trojan horses dropped from web sites, and virus-infected records obtained from peer-to-peer connections. Malwares looks for existing flaws and loopholes in the system architecture to make a peaceful and simple entrance.
Lanes or routes used by an attacker to gain access to the target (attack vectors), is to exploit existing vulnerabilities in the Rocky Summit University’s are:
For example, Conklin (2010) explains a 2003 attack known as the Slammer Worm: “It exploited a buffer-overflow vulnerability in computers running Microsoft’s SQL server or Microsoft SQL Server Desktop Engine… Within the first 24 hours of release, the worm had infected at least 120,000 hosts and caused network outages and the disruption of airline flights, elections, and ATMs. At its peak, Slammer-infected hosts were generating a reported 1TB of worm-related traffic every second… The problems it caused were a result of the massively overloaded networks, which could not sustain the traffic being generated by thousands of infected hosts. The worm sent its single packet to a specific UDP port, 1434” (p.6). By performing a ping sweep to see which computers on a network are live followed by a port scan to see which ports are open and what services are running on those machines, it would be very possible for a hacker or group of hackers to pull off an attack similar to the Slammer Worm. In fact, once a hacker has a way into the system and knows which vulnerabilities to exploit, there’s really no limit to the damage potential caused by the
Viruses and worms are malicious programs that self-replicate on computers or through computer systems without the user being cognizant. Worms are a series programs that repeat themselves from system to system minus the use of a host fie. Worms use methods to infiltrate remote computers and launch replicas of themselves like email messages or coping files to an accessible disk. A computer virus is a
Attackers attack the network by identifying a weak point in the network and create a network threat. There are four primary classes of threat: Unstructured Threats, Structured Threats, External threats and internal
Computer virus is a harmful software program written intentionally to enter a computer without the user's permission or knowledge. It has the ability to replicate itself, thus continuing to spread. Some viruses do little but
A computer virus is a type of malware that during repetitions by inserting copies of itself (possibly modified) in other computer programs, files, or the boot sector of the hard disk; If the replication was successful, the affected areas are then "infected". Viruses lead to often a type of harmful activity infected hosts such as steal, disk space on the hard disk or CPU time, display uncontrollable message, steal user contacts, access to private information, corrupt user or system data or log keyboard. However, the main characteristic of viruses is self-replicating and self-installing. Only some of viruses would carry a payload or have a hidden behavior.
A computer virus is Program or a portion of the codes that enter into the computer to target vandalism and characterized by their ability to copy itself to many copies and their ability to move from place to place and from computer to computer, disappearances and contents cover.
One of the ways in which cyber criminals like to operate is by causing an interruption of service which can cause significant damage to all those effected. When a network comes to a screeching halt, so do all of the services that corporation or organization provides.