You are on page 1of 4

Virus vs Worm

The primary difference between a virus and a worm is that viruses must be triggered by
the activation of their host; whereas worms are stand-alone malicious programs that can
self-replicate and propagate independently as soon as they have breached the system.
Worms do not require activation—or any human intervention—to execute or spread
their code.

Viruses are often attached or concealed in shared or downloaded files, both executable
files—a program that runs script—and non-executable files such as a Word document
or an image file. When the host file is accepted or loaded by a target system, the virus
remains dormant until the infected host file is activated. Only after the host file is
activated, can the virus run, executing malicious code and replicating to infect other files
on your system.

Intruders:
 The objective of the intruder is to gain access to a system or to increase the
range of privileges accessible on a system. Most initial attacks use system or
software vulnerabilities that allow a user to execute code that opens a back door
into the system.
 There are three classes of intruders:
o Masquerader: An individual who is not authorized to use the computer and
who penetrates a system’s access controls to exploit a legitimate user’s
account. The masquerader is likely to be an outsider.
o Misfeasor: A legitimate user who accesses data, programs, or resources
for which such access is not authorized, or who is authorized for such
access but misuses his or her privileges. The misfeasor generally is an
insider.
o Clandestine user: An individual who seizes supervisory control of the
system and uses this control to evade auditing and access controls or to
suppress audit collection. The clandestine user can be either an outsider
or an insider.

Insider Threat
An insider threat is a malicious threat to an organization that comes from people within the
organization, such as employees, former employees, contractors or business associates, who have
inside information concerning the organization's security practices, data and computer systems. The
threat may involve fraud, the theft of confidential or commercially valuable information

Types of insider threats include:


 Malicious insider—also known as a Turncloak, someone who
maliciously and intentionally abuses legitimate credentials, typically
to steal information for financial or personal incentives. For
example, an individual who holds a grudge against a former
employer, or an opportunistic employee who sells secret information
to a competitor. Turncloaks have an advantage over other attackers
because they are familiar with the security policies and procedures
of an organization, as well as its vulnerabilities.
 Careless insider—an innocent pawn who unknowingly
exposes the system to outside threats. This is the most common
type of insider threat, resulting from mistakes. For example, an
employee who intends no harm may click on an insecure link,
infecting the system with malware.

A mole—an imposter (ढोंगी) who is technically an outsider but has


managed to gain insider access to a privileged network. This is
someone from outside the organization who poses as an employee
or partner.

Information warfare
In the 21st century the familiar form of warfare in which physical damage is
meted out against the opponent’s military forces and infrastructure has
become only one form of attack. Instead, states are increasingly launching
non-lethal attacks against an enemy’s information systems – this is the rise of
information warfare.
Information warfare (IW) (as different from cyber warfare that attacks computers, software, and
command control systems) manipulates information trusted by targets without their awareness, so
that the targets will make decisions against their interest but in the interest of the one conducting
information warfare. 

 Criminal organizations
Organized crime is a category of transnational, national, or local groupings of highly
centralized enterprises run by criminals to engage in illegal activity, most commonly for
profit.
Some criminal organizations, such as terrorist groups, rebel forces, and separatists, are
politically motivated. Sometimes criminal organizations force people to do business with
them, such as when a gang extorts money from shopkeepers for "protection".[1] Street
gangs may often be deemed organized crime groups or, under stricter definitions of
organized crime, may become disciplined enough to be considered organized. A criminal
organization can also be referred to as a gang, mafia, mob,[2][3] ring,[4] or syndicate;[5] the
network, subculture, and community of criminals may be referred to as the underworld.

Avenues of Attack-
A computer system is attacked for two general reasons: it is
specifically targeted by the attacker, or it is a target of opportunity. In
the first case, the attacker has chosen the target not because of the
hardware or software the organization is running but for another
reason, such as a political reason. For example, an individual in one
country might attack a government system in another country to
gather secret information. Or the attacker might target an organization
as part of a “hacktivist” attack—the attacker could deface the web site
of a company that sells fur coats because the attacker believes using
animals in this way is unethical, for example. Perpetrating some sort
of electronic fraud is another reason a specific .

The avenues of attack with computers are when a


computer is used for a crime. Another avenue of
attack is when a computer is used to go against
company rules and regulations. Another avenue of
attack is when a computer is attacked by a hacker.
1. Reconnaissance (also known as profiling)
2. Scanning
3. Researching vulnerability
4. Performing the attack

active attack
Active attacks are attacks in which the hacker attempts to change or transform
the content of messages or information. These attacks are a threat to the
integrity and availability of the system. Due to these attacks, systems get
damaged, and information can be altered. The prevention of these attacks is
difficult due to their high range of physical and software vulnerabilities. The
damage that is done with these attacks can be very harmful to the system and
its resources. 

 PASSIVE ATTACK
Passive attacks are the ones in which the attacker observes all the messages
and copy the content of messages or information. They focus on monitoring
all the transmission and gaining the data. The attacker does not try to change
any data or information he gathered. Although there is no potential harm to
the system due to these attacks, they can be a significant danger to your
data’s confidentiality. 

You might also like