You are on page 1of 5

Software attacks

Software attacks

 Deliberate software attacks occur when an individual or group designs deploys software
to attack a system.
 This attack can consist of specially crafted software that attackers trick users into
installing on their systems.
 This software can be used to overwhelm the processing capabilities of online systems or
to gain access to protected systems by hidden means.
Malware

 Adware
 Boot virus
 Macro virus
 Memory Resident virus
 Non-memory resident
 Polymorphic
 Spyware
 Trojan Horse
 Virus hoax
 Virus
 Worm
 Zero-day attack
 Malicious code attacks
Malware Type Year System Infected Financial
Damage
MyDoom Worm 2004 2 million $38 Billion
Klez(and Variants) Virus 2001 7.2% of internet $19.8 Billion
ILOVEYOU virus 2000 10% of internet $5.5 Billion
Sobig F Worm 2003 1 million $3 Billion
Code Red worm 2001 400,000 servers $2.6 billion
SQL Slammer worm 2003 75,000 $950 million
Melissa Macro Virus 1999 unknown $300 million

You might also like