You are on page 1of 2

Phishing refers to use of deceptive computer-based means to trick individuals into disclosing sensitive

personal information. To perform a phishing attack, an attacker creates a Web site or e-mail that looks
as if it is from a well-known organization, such as an online business, credit card company, or financial
institution.13 The fraudulent e-mails and Web sites are intended to deceive users into disclosing
personal data, usually financial information. For example, phishers might seek usernames and
passwords for online banking sites, as well as bank account numbers.

A botnet is a collection of compromised computers, each of which is known as a 'bot', connected to the
Internet. When a computer is compromised by an attacker, there is often code within the malware that
commands it to become part of a botnet. The "botmaster" or "bot herder" controls these compromised
computers via standards-based network protocols such as IRC and http.[1].

A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal


authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while
attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back
Orifice) or may subvert the system through a rootkit.

Internet bots, also known as web robots, WWW robots or simply bots, are software applications that
run automated tasks over the Internet. Typically, bots perform tasks that are both simple and
structurally repetitive, at a much higher rate than would be possible for a human alone

A rootkit is a stealthy type of malicious software (malware) designed to hide the existence of certain
processes or programs from normal methods of detection and enables continued privileged access to a
computer.

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an


attempt to make a computer or network resource unavailable to its intended users. Although the means
to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted
efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently
or at all, temporarily or indefinitely.

A spoofing attack is a situation in which one person or program successfully tricks as another by
falsifying data and thereby gaining an illegitimate advantage.
Many of the protocols in the TCP/IP suite do not provide mechanisms for authenticating the source or
destination of a message. They are thus vulnerable to spoofing attacks when extra precautions are not
taken by applications to verify the identity of the sending or receiving host. IP spoofing and ARP spoofing
in particular may be used to leverage man-in-the-middle attacks against hosts on a computer network.
Spoofing attacks which take advantage of TCP/IP suite protocols may be mitigated with the use of
firewalls capable of deep packet inspection or by taking measures to verify the identity of the sender or
recipient of a message.

Spyware is a type of malware (malicious software) installed on computers that collects information
about users without their knowledge. The presence of spyware is typically hidden from the user and can
be difficult to detect. Spyware is often secretly installed on a user's personal computer without their
knowledge. However, some spyware such as keyloggers may be installed by the owner of a shared,
corporate, or public computer on purpose in order to intentionally monitor users.

Adware, or advertising-supported software, is any software package which automatically renders


advertisements. These advertisements can be in the form of a pop-up.[1] They may also be in the user
interface of the software or on a screen presented to the user during the installation process. The object
of the Adware is to generate revenue for its author. Adware, by itself, is harmless; however, some
adware may come with integrated spyware such as keyloggers and other privacy-invasive software.[

A computer worm is a standalone malware computer program that replicates itself in order to spread to
other computers. Often, it uses a computer network to spread itself. This is due to security shortcomings
on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program.
Worms almost always cause at least some harm to the network, even if only by consuming bandwidth,
whereas viruses almost always corrupt or modify files on a targeted computer.

A Trojan horse, or Trojan, is a standalone malicious program which may give full control of infected PC
to another PC[1]. It may also perform typical computer virus activities[2]. Trojan horses may make
copies of themselves, steal information, or harm their host computer systems.[

A computer virus is a computer program that can replicate itself[1] and spread from one computer to
another. Viruses can increase their chances of spreading to other computers by infecting files on a
network file system or a file system that is accessed by other computers

You might also like