You are on page 1of 5

Eternal threats to computer

systems
DDoS
• DDoS is short for Distributed Denial of
Service. DDoS is a type of DOS attack where
multiple compromised systems, which are often
infected with a Trojan, are used to target a single
system causing a Denial of Service (DoS) attack.
• Attacks are becoming more powerful and efficient;
last year, 78% of attacks resulted in service
degradation or a complete outage, compared to
68% in 2017
Phishing
• One of the easiest ways to compromise user accounts is through the
use of phishing, a socially-engineered attack designed to trick users
into clicking malicious links or giving up their credentials.
• Phishing emails are designed to look like they’re coming from a
credible source or website, but they’re actually sent by malicious
hackers.
• Often, their email will contain a link that will redirect users to a fake
login in an attempt to steal their credentials. After, an attacker may
use these credentials to gain access to critical applications, leading to
a data breach.
Virus / Trojan
• A computer virus, much like a flu virus, is designed to spread from
host to host and has the ability to replicate itself. Similarly, in the same
way that viruses cannot reproduce without a host cell, computer
viruses cannot reproduce and spread without programming such as a
file or document.
• A Trojan horse or Trojan is a type of malware that is often disguised
as legitimate software. Trojans can be employed by cyber-thieves and
hackers trying to gain access to users' systems. Users are typically
tricked by some form of social engineering into loading and
executing Trojans on their systems.
Why are systems attacked?
• Systems are attacked for many different reasons
for example…
• It may be an accident or not ment to do anything
• It could be someone wanting to log into your
account to get followers
• It could be someone wanting to get money and
your personal deatails

You might also like