• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Common methods of attack and types of malware

Extracts from this document...


Common methods of attack and types of malware Some of the more common types of attacks are hoaxes, password cracking, denial of service attacks/distributed denial of service attacks, fake antivirus attacks, etc. Other terms to be familiar with include spoofing, which is essentially impersonating, phishing, which is impersonating and trying to get information; spear phishing which is replicating a common site to try to get more information from people; whaling ? which is focusing on trying to get specific information on high-profile people; and vhishing which is using voice mail to drive to a website. Malware is simply unauthorized software that?s placed on someone?s computer with their knowledge or consent. Malware is meant to infect a computer system, conceal the actions and make some monetary gain. There are a number of types of malware, including: 1. ...read more.


Most hackers have strong technical skills, are motivated by thrill or some sense of power, and typically do damage as a by-product of their illegal activity 2. Script kiddies, like hackers, illegally break into a computer or use it for unauthorized purposes. Unlike hackers, they are not as technically savvy ? they usually download scripts from the web and are usually considered more dangerous that hackers because they are less technically aware of the damage they?re causing. 3. Employees are the most damaging because of their internal knowledge of the systems, uses, etc. and pose the largest IS threat 4. Cyber-criminals typically target for financial reasons ? common examples are identity thieves, financial fraudsters. They are typically career criminals. 5. Spies are individuals who have been hired for a specific purpose ? to break into a computer and steal information. ...read more.


Diversify 1. Layers must be different/diverse. If an attacker penetrates one layer, they can?t use the same methodology to penetrate the others. 1. Obscurity 1. Not revealing the type of computers, operating systems, software, network connections, etc. 1. Simplify 1. Networks are complex by nature. The security layer needs to be simple enough for internal resources to manage and use. CIA Triangle + Authentication and Non-repudiation 1. Confidentiality 1. Basically means that those with sufficient privileges have access certain information. Can use classifications, encryption, controls, etc. 1. Integrity 1. Quality of the information ? is it whole, complete and uncorrupted 1. Availability 1. Is the information accessible to authorized users? Users can be another person or a computer 1. Authentication 1. Requires you to prove you are who you say you are by something you have, something you are, or something you know. 1. Non-Repudiation 1. The most difficult to pull off ? simply means that a message has been sent and received and the sender can be verified ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Free essay

    Setting up and E-Commerce Site

    But, for businesses we need something a little more professional and something which has more functions. These functions are as follows; * Antivirus kernel * Automatic updates * Simple User Interface * PUSH updates * Enhanced User Interface * Virus Chest * Resident protection * System integration * Script blocker

  2. Smart Card System

    This is essential in order for the evaluation to take place before the system is to be functioned. Several testing approaches are going to be developed and using them to validate and verify the system. The testing is vital in order to deliver complete functioning system and to provide quality to the vendor.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Screens and user interface need to be in place. The module(s) implemented for the prototype system should be fully functional, but will lack some of the sophistication that you would expect to see in the fully developed coursework, such as, error trapping routines and full validation of inputs, which should be included in CP6.)

  2. Introduction to Viruses

    This is made worse since viruses which "just infect", with no attack phase, damage the programs or disks they infect. This is not intentional on the part of the virus, but simply a result of the fact that many viruses contain extremely poor quality code.

  1. Logic and Logic Gates

    [M2] 3) Describe the difference between astable and bistable flip-flops using appropriate diagrams. [M4] 4) Build complex logic circuits from arrays of simple logic circuits to: a) Use Half-Adders and further logic gates to build a Full Adder b)build a logic circuit including Full Adders to add together the contents of two eight-bit registers.

  2. Flexible Architectures in Communication Security Application

    We first examine the execution of eight widely known strong secret-key ciphers. We analyze their performance on detailed microarchitectural models, where we are able to clearly show their performance and the bottlenecks that slow their progress. Armed with these insights, we propose a general set of instructions that from which all these kernels can benefit.

  1. To specify different types of software for 3 different systems

    They are user friendly. GUI generally characterised by the use of windows, icons, drop down menus, and a pointing device like as a mouse. The first company the created GUI was Xerox. The firs project that would have been the first commercial GUI was Lisa but the project had to

  2. Ways of Promoting a Website

    per year www.ukreg.com - hosting �3.99 Free Website Promotion Plan Search Engine Optimisation - Based on How the Search Engine Works There are many things that can be done to promote a website. Some are more important than others, however if as many steps as possible are followed then the chances of success are increased.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work