You are on page 1of 1

Name: Ahmad Omar

Group: A
Q\How do the security threats work?
1. Worms: When a computer worm loads and starts running on a freshly infected system,
its primary goal is to stay active on the infected system for as long as feasible while
spreading to as many additional vulnerable systems as possible.Unlike viruses, which
require a functional application to be infected with harmful code, worms simply require
access to a computer and may then spread on their own.
Viruses: Some computer viruses are designed to damage your computer by destroying
files, corrupting applications, or reformatting the hard drive. Others just reproduce
themselves or overwhelm a network with traffic, rendering all internet activity impossible.
Even less dangerous computer viruses may wreak havoc on your system's efficiency, robbing
it of RAM and triggering frequent crashes.
2. Malware trojan horse: Trojan viruses function by exploiting a user's lack of security
awareness as well as computer security measures such as antivirus and antimalware
software. A Trojan usually appears as a malicious attachment to an email. The file,
software, or application looks to have been downloaded from a reliable source. The aim
is to get the user to open the file and download it. Malware or other harmful content is
then installed and activated on the computer or other devices as a result of this.\
3. Zero-day attack: A zero day attack occurs when a hacker successfully exploits a
vulnerability before software developers have time to fix it. Because zero-day
vulnerabilities might emerge as any sort of larger software flaw, they can take practically
any shape. Missing data encryption, SQL injection, buffer overflows, missing
authorizations, faulty algorithms, URL redirection, bugs, and password security issues
are just a few examples.
4. Identity theft: Identity theft is committed by cyber criminals employing sophisticated
cyber assault methods such as social engineering, phishing, and malware. Criminals can
take mail, search through trash, and listen in on phone calls in public areas, all of which
can result in identity theft. The ultimate objective of many cyber assaults is to obtain
enough information about a victim to impersonate them and conduct fraud.
5. Denial of Services(DoS) attack: A denial-of-service attack is carried out by flooding the
targeted host or network with traffic until it becomes unable to react or simply collapses,
denying genuine users access. While an organization's resources and services are
unavailable, DoS attacks may cost them both time and money.
6. Data Interception and theft: This is done via packet sniffer software, which analyzes
data packets as they travel over a network or the internet. The data obtained is sent on to
a hacker. Interception assaults, which are essentially a breach of confidentiality, allow
unauthorized individuals to access our data, applications, or surroundings. Interception
can take the form of unlawful file viewing or copying, listening in on phone calls, or
reading e-mail, and it can be done on data in motion or at rest.

You might also like