You are on page 1of 13

Types of Threats in Networks

Submitted by Given by
AMISHA ARORA Dr MEENAKSHI SRIVASTAVA
RAMANDEEP KAUR
TYPES OF THREATS
There are Ten Common Threats
 Computer Virus
 Trojan Horses
 Phishing
 Spoofing
 Spyware
 DOS attack
 Malware
 Rootkit
 Man-in-the-middle attack
 keylogger
COMPUTER VIRUS
 A computer virus is a type of malicious software that, when
executed, replicates itself by modifying other computer
programs and inserting its own code.
 Viruses are known to send spam, disable your security
settings, corrupt and steal data from your computer, even going
as far as to delete everything on your hard drive.
 Solution: Install a security program that protects the computer
against threats.
 Types of viruses:- Boot sector virus, macro virus, multipartite
virus
TROJAN HORSE
 Trojan, is any malicious computer program which
misleads users of its true intent.
 Trojans are generally spread by some form of social
engineering, for example where a user is duped into
executing an e-mail attachment disguised to appear not
suspicious or by clicking on some fake advertisement on
social media or anywhere else.
 Ransomware attacks are often carried out using a
Trojan.
PHISHING
 Phishing is “ an e-mail fraud method in which the
perpetrator sends out legitimate-looking emails in an attempt
to gather personal and financial information from recipients.
 In my opinion phishing is one of the worst security threats
over a network because a lot of people that use computers
linked up to a network are amateurs and would be very
vulnerable to giving out information that could cause
situations such as theft of money or identify theft.
 Solution: Phishing can be prevent by using Phishing filters
to filter out this unwanted mail and to prevent threat.
SPOOFING
 Spoofing is the act of assuming the identity of some other
computer or program.
 Types of Network spoofing:
 IP Spoofing:- “In an IP address spoofing attack, an attacker sends IP
packets from a false source address in order to disguise itself.”
 ARP spoofing:- “ In an ARP spoofing attack, a malicious party
sends spoofed ARP messages across a local area network in order to
link the attacker’s MAC address with the IP address of a legitimate
member of the network.”
 DNS spoofing:- “ In a DNS server spoofing attack, a malicious party
modifies the DNS server in order to reroute a specific domain name to a
different IP address.”
SPYWARE
 Spyware is software that aims to gather information
about a person or organization, sometimes without
their knowledge, that may send such information to
another entity without the consumer's consent,
through cookies .
 "Spyware" is mostly classified into four types: adware,
system monitors, tracking cookies and trojans.
 Solution: It can be prevented using anti-spyware
software.
DOS ATTACK
 A denial-of-service (DoS) is any type of attack where the
attackers attempt to prevent legitimate users from
accessing the service or network.
 In the DoS, the attackers usually send several messages
asking the server to accepts requests from invalid return
addresses.
 Defensive responses to denial-of-service attacks typically
involve the use of a combination of attack detection,
traffic classification and response tools.
MALWARE
 Malware is any software intentionally designed to cause
damage to a computer, server, client, or computer
network.
 Malware does the damage after it is implanted or
introduced in some way into a target's computer and can
take the form of executable code, scripts, active content,
and other software.
 Solution: It can be prevented using anti-malware software.
ROOTKIT
 A rootkit is a collection of computer software,
typically malicious, designed to enable access to a computer or
an area of its software that is not otherwise allowed and often
masks its existence or the existence of other software.
 Rootkit installation can be automated, or an attacker can install
it after having obtained root or Administrator access.
 Manual removal of a rootkit is often too difficult for a typical
computer user, but a number of security-software vendors offer
tools to automatically detect and remove some rootkits,
typically as part of an antivirus suite.
MAN-IN-THE MIDDLE ATTACK
 Man-in-the-middle attacks are cyber security attacks that allow
the attacker to eavesdrop on communication between two
targets.
 It can listen to a communication which should, in normal
settings, be private.
 Here are just some of the types of MITM attacks:
 DNS spoofing.
 HTTPS spoofing.
 IP spoofing.
 ARP spoofing.
 SSL hijacking.
 Wi-Fi hacking.
KEYLOGGER
 Keylogging is the action of recording (logging) the keys
struck on a keyboard, typically covertly, so that person using
the keyboard is unaware that their actions are being monitored.
 The use of their computers, keyloggers are most often used for
the purpose of stealing passwords and other confidential
information.
 Solution: It can be prevented using anti-keylogger software.
 An anti-keylogger is a piece of software specifically designed
to detect keyloggers on a computer, typically comparing all
files in the computer against a database of keyloggers looking
for similarities which might signal the presence of a hidden
keylogger.
THAT’S ALL
THANK
YOU FOR WATCHING
MY PRESENTATION
I HOPE YOU
ENJOYED IT

You might also like