You are on page 1of 34

The most common include:

 Viruses, worms, and Trojan horses


 Intruders
 Spyware and adware
 Zero-day attacks(zero-hour attacks)
 Denial of service attacks
What are Computer Viruses???

 It is a computer program that can copy


itself and infect a computer without
permission or knowledge of the user.
 Some viruses are programmed to damage
the computer by damaging programs,
deleting files, or reformatting the hard
disk.

 Others are not designed to do any damage,


but simply replicate themselves and
perhaps make their presence known by
presenting text, video, or audio messages.
 Network Virus
 Logic Bombs
 Boot Virus(Disk Killer & Stone virus)
 Multipartite Virus(Invader, Flip & Tequila)
 Macro Virus(DMV, Nuclear)
 Trojan horse
 Worms
 Program virus(Sunday, Cascade)
 An intruder is somebody ("hacker" or
"cracker") attempting to break into or
misuse your system
• Trojan horse programs
• Back door and remote administration
programs
• Denial of service
• Being an intermediary for another attack
• Unprotected Windows shares
• Mobile code (Java/JavaScript/ActiveX)
• Cross-site scripting
• Packet sniffing
 It is the art of detecting intruders behind
attacks as unique persons.

 Intruder Detection Systems try to detect


who is attacking a system by analyzing his
or her computational behavior or biometric
behavior.
• Keystroke Dynamics (keystroke patterns, typing pattern,
typing behavior)
• Patterns using an interactive command interpreter:
– Commands used
– Commands sequence
– Accessed directories
– Character deletion
• Patterns on the network usage:
– IP address used
• ISP
• Country
• City
– Ports used
– TTL analysis
– Operating system used to attack
– Protocols used
– Connection times patterns
• Spyware is a type of malware

• Spyware programs can collect various types of


personal information,
• Spyware is known to change computer settings,
 Come bundled with other software

 Web browser

 Web Sites
 CoolWebSearch,
 Internet Optimizer
 Hunt Bar, aka Win Tools or adware Web
search
 Zango
 Zlob Trojan, or just Zlob
 It is a computer threat that tries to exploit
computer application vulnerabilities that are
unknown to others or undisclosed to the
software developer.
 An attacker attempts to prevent users from
accessing information or services.

 By targeting your computer and its network


connection, or the computers and network of the
sites you are trying to use, an attacker may be
able to prevent you from accessing email,
websites, online accounts (banking, etc.), or other
services that rely on the affected computer.
• An attacker may use your computer to attack
another computer.
• Not all disruptions to service are the result of a
DoS. There may be technical problems with a
particular network, or system administrators.

• The following symptoms could indicate a DoS or


DDoS attack:
• unusually slow network performance (opening files or
accessing websites)
• unavailability of a particular website
• inability to access any website
• dramatic increase in the amount of spam you receive in
your account
Spamming

 What is spam?

 Where does it come from?

 How much of a problem is spam?

 What can we do to stop or minimize spam coming


to your computer?
 Experts believe that up to 90% of all email is
now generated by spam robots.

 In 2007, for the first time, the total of spam


emails surpassed genuine emails: 10.8 trillion
to 10.5 trillion.
 Spam can be used to spread computer viruses,
Trojan horses or other malicious software. The
objective may be identity theft or fraud.

 Some spam attempts to capitalize on human greed


whilst other attempts to use the victims'
inexperience with computer technology to trick
them, eg, phishing.
BAD FOR YOU:
 Wastes bandwidth and YOUR valuable download
allowance
 Wastes YOUR time dealing with it
 May contain malware than can infect YOUR
computer
 May cost YOU money if you get tricked into giving
out sensitive information
BAD FOR BUSINESS:
• Spam affects productivity, i.e., wastes time and,
in business, TIME IS MONEY.
• In Australia, the time and bandwidth lost to spam
is estimated to cost business $2 billion a year.
• In the US, a national survey in 2004 found that
workers spend 2.8 minutes a day deleting spam at
a cost to business of $21.6 billion p.a. in lost
productivity.
Spam can be categorized into two main types:
 Emails that try to sell you something, e.g.
Viagra or a fake Rolex watch, or
 Emails that try to steal your confidential or
personal information, eg online banking login
details, credit card details, or social security
number (in the US).
 The type of spam that tries to trick you, in order
to steal your personal information, is also known
as “phishing”.

 The outcome to you can be very costly – you can


lose a lot of money through fraudulent use of your
online identity by cyber criminals.
case study
Google case study

You might also like