• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Common methods of attack and types of malware

Extracts from this document...


´╗┐Common methods of attack and types of malware Some of the more common types of attacks are hoaxes, password cracking, denial of service attacks/distributed denial of service attacks, fake antivirus attacks, etc. Other terms to be familiar with include spoofing, which is essentially impersonating, phishing, which is impersonating and trying to get information; spear phishing which is replicating a common site to try to get more information from people; whaling ? which is focusing on trying to get specific information on high-profile people; and vhishing which is using voice mail to drive to a website. Malware is simply unauthorized software that?s placed on someone?s computer with their knowledge or consent. Malware is meant to infect a computer system, conceal the actions and make some monetary gain. There are a number of types of malware, including: 1. ...read more.


Most hackers have strong technical skills, are motivated by thrill or some sense of power, and typically do damage as a by-product of their illegal activity 2. Script kiddies, like hackers, illegally break into a computer or use it for unauthorized purposes. Unlike hackers, they are not as technically savvy ? they usually download scripts from the web and are usually considered more dangerous that hackers because they are less technically aware of the damage they?re causing. 3. Employees are the most damaging because of their internal knowledge of the systems, uses, etc. and pose the largest IS threat 4. Cyber-criminals typically target for financial reasons ? common examples are identity thieves, financial fraudsters. They are typically career criminals. 5. Spies are individuals who have been hired for a specific purpose ? to break into a computer and steal information. ...read more.


Diversify 1. Layers must be different/diverse. If an attacker penetrates one layer, they can?t use the same methodology to penetrate the others. 1. Obscurity 1. Not revealing the type of computers, operating systems, software, network connections, etc. 1. Simplify 1. Networks are complex by nature. The security layer needs to be simple enough for internal resources to manage and use. CIA Triangle + Authentication and Non-repudiation 1. Confidentiality 1. Basically means that those with sufficient privileges have access certain information. Can use classifications, encryption, controls, etc. 1. Integrity 1. Quality of the information ? is it whole, complete and uncorrupted 1. Availability 1. Is the information accessible to authorized users? Users can be another person or a computer 1. Authentication 1. Requires you to prove you are who you say you are by something you have, something you are, or something you know. 1. Non-Repudiation 1. The most difficult to pull off ? simply means that a message has been sent and received and the sender can be verified ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Logic and Logic Gates

    The logical expression for this is pretty simple. The + actually stands for OR. This expression mean Q = A (OR) B Truth Table Input Output AB Q 00 1 01 0 10 0 11 0 4. NOR Gate There are two inputs so the formula would be 22 and the answer is 4.

  2. Ways of Promoting a Website

    How could the site be improved? - The site could be improved with newer pictures, possibly from games from the weekends, better graphical representations and more focused text. The self assessment questionnaire is very important when trying to achieve a website that is constantly achieving its potential.

  1. Free essay

    Setting up and E-Commerce Site

    As we can see they offer affordable services and this is something that should be considered greatly by small businesses as they don't know at first how there new business venture is going to fair. They offer a basic web package so at least this time everything is all included,

  2. Smart Card System

    in which components of a system may change on a regular basis. Java's run-time linking guarantees that a program always loads the most recent version of its library modules. It also reduces recompilation by making it possible to add methods and instance variables to a library without having to recompile its clients.

  1. Flexible Architectures in Communication Security Application

    3DES has a key size of 112 bits, block size of 64 bits, and 48 rounds. Rijndael has key size of 128 bits, block size of 128 bits, and Lisa Wu Page 16 4/22/01 10 rounds. The remaining kernels use at least 128 bits of key data.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Word processing software Advanced packages can contain features of the above system. Input of data by the user would be simple but the disadvantages severely outweigh the advantages. The user will have to operate the software with no clear guidance along the way.

  1. Introduction to Viruses

    These categorizations often overlap the previous categories mentioned, and may be included in the description (e.g., polymorphic file virus).These categories include: > Polymorphic Viruses Viruses that change their characteristics as they infect. > Stealth Viruses Viruses that try to actively hide themselves from anti-virus or system software.

  2. To specify different types of software for 3 different systems

    They are user friendly. GUI generally characterised by the use of windows, icons, drop down menus, and a pointing device like as a mouse. The first company the created GUI was Xerox. The firs project that would have been the first commercial GUI was Lisa but the project had to

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work