Cyber Attack

60 %
40 %
Information about Cyber Attack

Published on July 22, 2014

Author: nishantyadav50


Virus : Virus A  computer virus  is a computer program that can replicate itself and spread from one computer to another. The virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. Like humans, even computer virus have a variety. some virus may cause only mildly annoying effects while others can damage your hardware, software or files. People continue the spread of a computer virus mostly unknowingly by sharing infecting files or sending e-mails with viruses as attachments in the e-mail. Hacking: Hacking Hacking refers to the technique or process by which a hacker gains access to a computer system. Hacking may be for several reasons like for profit, protest, challenge or simply for fun. It deals with exploiting a weakness or vulnerability i.e. targeting loop holes in the computer system. There are different types of hackers such as 1) White Hat 2) Black Hat 3) Grey Hat 4) Elite Hacker 5) Script Kiddie 6) Neophyte 7) Blue Hat 8) Hacktivist Spam: Spam Spam is the use of electronic messaging systems to send unsolicited bulk messages, especially advertising via email. Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Most people class all unsolicited email as spam including automatic replies, emails containing viruses and unsolicited but legitimate business propositions which is broadly correct because spammers often use special techniques for some types of attacks. The spam block communication channels and email boxes. There are many types of spam like e-mail spam, instant messaging spam, newsgroup and forum, mobile phone spam, social networking spam, online game messaging spam and spamdexing. Phishing: Phishing Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing messages usually take the form of fake notifications from banks, providers, e-pay systems and other organizations. The notification will try to encourage a recipient, for one reason or another, to urgently enter/update their personal data. Such excuses usually relate to loss of data, system breakdown, etc. Worm: Worm A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. A worm is similar to a virus by design and is considered to be a sub-class of a virus, but unlike virus it has the capability to travel without any human action. Worms almost always cause at least some harm to the network, even if even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. Due to the copying nature of a worm and its capability to travel across networks Trojan: Trojan The Trojan Horse at first glance will appear to be useful software but actually do damage once installed or run on your computer. A Trojan horse , or Trojan , is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer. Trojan horses can make copies of themselves, steal information, or harm their host computer systems. Trojans do not reproduce by infecting other files nor do they self-reproduce. IP Spoofing : IP Spoofing IP Spoofing also known as IP address forgery or a host file hijack, is a hijacking technique in which a cracker masquerades or a trusted host to conceal his identity, spoof a Web site, hijack browsers or gain access to a network. The Hijackers obtains the IP address of a legitimate host and alters packet headers so that the legitimate host appears to be the source. The Hijacker could alter or steal sensitive data, such as a credit card number or password, or install malware. In IP Spoofing the goal is to flood the victim with overwhelming amounts of traffic, and the attacker does not care about receiving responses to the attack packets.

Add a comment

Related presentations

Related pages

Cyberattacke – Wikipedia

Das Verteidigungsministerium Südkoreas in Seoul erhöhte die Alarmstufe für Cyber-Bedrohungen auf den Wert drei einer fünfstufigen Skala.
Read more

Cyber-attack - Wikipedia, the free encyclopedia

Cyber-attack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures ...
Read more

Cyberkrieg – Wikipedia

Juni 2003 als eine Abteilung des Office of Cyber Security & Communications aufnahm, ... Angriffen auf Computernetze (Computer Network Attack, CNA), ...
Read more | cyber attack | Wörterbuch Englisch-Deutsch

Übersetzung für cyber attack im Englisch-Deutsch-Wörterbuch
Read more

Cyberwarfare - Wikipedia, the free encyclopedia

As of that month, there had been no significant economic or physical damage to India related to cyber attacks. Cyberwarfare in Iran Iran has been both ...
Read more

Cyber Attack |

During a Cyber Attack Immediate Actions. Check to make sure the software on all of your systems is up-to-date. Run a scan to make sure your system is not ...
Read more

Cyber Attack News, Photos and Videos - ABC News

Browse Cyber Attack latest news and updates, watch videos and view all photos and more. Join the discussion and find more about Cyber Attack at
Read more

What is a Cyberattack? - Definition from Techopedia

Cyberattack Definition - A cyberattack is deliberate exploitation of computer systems, ... Cyber Attack, Cyber-Attack Recommended For You ...
Read more

Cyber Attacks - The Huffington Post

If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and ...
Read more

Cyberattacke - Online |

Cyber-Bankräuber erbeuten 45 Millionen Dollar. Teilen. Facebook Twitter Google+. Nach Hackerangriffen auf US-Promis "Es ist unmöglich geworden, sich vor ...
Read more