• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Common methods of attack and types of malware

Extracts from this document...


´╗┐Common methods of attack and types of malware Some of the more common types of attacks are hoaxes, password cracking, denial of service attacks/distributed denial of service attacks, fake antivirus attacks, etc. Other terms to be familiar with include spoofing, which is essentially impersonating, phishing, which is impersonating and trying to get information; spear phishing which is replicating a common site to try to get more information from people; whaling ? which is focusing on trying to get specific information on high-profile people; and vhishing which is using voice mail to drive to a website. Malware is simply unauthorized software that?s placed on someone?s computer with their knowledge or consent. Malware is meant to infect a computer system, conceal the actions and make some monetary gain. There are a number of types of malware, including: 1. ...read more.


Most hackers have strong technical skills, are motivated by thrill or some sense of power, and typically do damage as a by-product of their illegal activity 2. Script kiddies, like hackers, illegally break into a computer or use it for unauthorized purposes. Unlike hackers, they are not as technically savvy ? they usually download scripts from the web and are usually considered more dangerous that hackers because they are less technically aware of the damage they?re causing. 3. Employees are the most damaging because of their internal knowledge of the systems, uses, etc. and pose the largest IS threat 4. Cyber-criminals typically target for financial reasons ? common examples are identity thieves, financial fraudsters. They are typically career criminals. 5. Spies are individuals who have been hired for a specific purpose ? to break into a computer and steal information. ...read more.


Diversify 1. Layers must be different/diverse. If an attacker penetrates one layer, they can?t use the same methodology to penetrate the others. 1. Obscurity 1. Not revealing the type of computers, operating systems, software, network connections, etc. 1. Simplify 1. Networks are complex by nature. The security layer needs to be simple enough for internal resources to manage and use. CIA Triangle + Authentication and Non-repudiation 1. Confidentiality 1. Basically means that those with sufficient privileges have access certain information. Can use classifications, encryption, controls, etc. 1. Integrity 1. Quality of the information ? is it whole, complete and uncorrupted 1. Availability 1. Is the information accessible to authorized users? Users can be another person or a computer 1. Authentication 1. Requires you to prove you are who you say you are by something you have, something you are, or something you know. 1. Non-Repudiation 1. The most difficult to pull off ? simply means that a message has been sent and received and the sender can be verified ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Smart Card System

    The other rule is that to avoid using jargon word. This is to prevent the misunderstanding from the user, which the user may just input some irrelevant data into the system. This in turn will cause the process of the out data to be incorrect.

  2. Logic and Logic Gates

    The truth table is on the side as always. You can only get the output as 0 if all the inputs are 0 and if either of the two inputs are 0 or 1 then the output will always be 1.

  1. Ways of Promoting a Website

    This makes PHP an efficient language. Active Server Pages Active server pages also known as ASP is a server side technology and mostly based on the Visual Basic programming language. The uses for ASP are varied but are often found when looking through the internet. The Microsoft made package is used mainly for sites that contain

  2. Free essay

    Setting up and E-Commerce Site

    Both need a combination of technical and marketing skills. So either you need to acquire the skills, or buy someone in to help. The good news is that everything can be self-taught, but there are also plenty of reasonably priced practitioners around.

  1. Flexible Architectures in Communication Security Application

    The kernel loop also exhibits a mixing of arithmetic and logical operations. Kernels that contain only arithmetic or only logical operations can easily be attacked using linear analysis. The implication of mixing these instructions with sequence as an ADD followed by a XOR or an AND followed by an ADD is to make the cipher resilient to attacks.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    It must be able to provide a printable output of this data if the user requires * After customer details have been input into the system it should be possible to search for a customer to find their contact information and the option of editing their details should be available.

  1. Introduction to Viruses

    These categorizations often overlap the previous categories mentioned, and may be included in the description (e.g., polymorphic file virus).These categories include: > Polymorphic Viruses Viruses that change their characteristics as they infect. > Stealth Viruses Viruses that try to actively hide themselves from anti-virus or system software.

  2. To specify different types of software for 3 different systems

    They are user friendly. GUI generally characterised by the use of windows, icons, drop down menus, and a pointing device like as a mouse. The first company the created GUI was Xerox. The firs project that would have been the first commercial GUI was Lisa but the project had to

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work