Zusammenfassung der Ressource
security threats
- MALWARE
- Malware—software written to
infect computers and commit
crimes such as fraud and
identity theft
- By exploiting vulnerabilities in
operating systems and
browsers, malware can sneak
malicious Trojan horse
programs onto unsecured PCs.
Unsuspecting and unprotected
users can also download
Trojans, thinking they are
legitimate game, music player,
movie, and greeting card files.
- effects of malware- Malware causes your connection to slow
down Malware causes your computer to slow down; badly
written code can cause your computer to crash. Malware can
cause your computer to display error messages continually.
Malware could cause your computer to be incapable of
shutting down or restarting as it keeps certain processes
active.
- PHISHING
- Phishing is the attempt to obtain
sensitive information such as usernames,
passwords, and credit card details (and,
indirectly, money), often for malicious
reasons, by disguising as a trustworthy
entity in an electronic communication.
- effects include--Theft of
identity and users'
confidential details. This
could result in financial
losses for users and even
prevent them from accessing
their own accounts. Loss of
productivity. Excessive
resource consumption on
corporate networks
(bandwidth, saturated email
systems, etc.).
- BRUTE FORCE ATTACK
- Brute force (also known as
brute force cracking) is a trial
and error method used by
application programs to decode
encrypted data such as
passwords or Data Encryption
Standard (DES) keys, through
exhaustive effort (using brute
force) rather than employing
intellectual strategies.
- effects of a brute force attack
include--access to bank
details,access to social media,
being logged out of accounts
and anything inside
yourcompuet such as files
- DENIAL OF SERVICE
- an interruption in an
authorized user's access
to a computer network,
typically one caused
with malicious intent.
- A Denial of Service (DoS) attack
happens when a service that
would usually work becomes
unavailable. ... The Denial of
Service attacks that we will be
discussing today are called
Distributed Denial of Service
(DDoS), which result from a large
number of systems maliciously
attacking one target.
- DATA INTERCEPTION
- When packets travel across a network,
they are susceptible to being read,
altered, or “hijacked.” Hijacking occurs
when a hostile party intercepts a
network traffic session and poses as
one of the session endpoints. An
attacker monitors data streams to or
from a target, in order to gather
sensitive information.
- EFFECTS--they can access
what ever data your
tranferring
- SQL INJECTION
- SQL Injection (SQLi) refers to an
injection attack wherein an
attacker can execute malicious
SQL statements (also commonly
referred to as a malicious
payload) that control a web
application's database server
(also commonly referred to as a
Relational Database
Management System – RDBMS).
- SQL injection attacks allow attackers to spoof
identity, tamper with existing data, cause
repudiation issues such as voiding transactions or
changing balances, allow the complete disclosure of
all data on the system, destroy the data or make it
otherwise unavailable, and become administrators
of the database server. SQL Injection is very common
with PHP and ASP applications due to the prevalence
of older functional interfaces. Due to the nature of
programmatic interfaces available, J2EE and ASP.NET
applications are less likely to have easily exploited
SQL injections. The severity of SQL Injection attacks
is limited by the attacker’s skill and imagination, and
to a lesser extent, defense in depth
countermeasures, such as low privilege connections
to the database server and so on. In general,
consider SQL Injection a high impact seve