Malware—software written to
infect computers and commit
crimes such as fraud and
identity theft
By exploiting vulnerabilities in
operating systems and browsers,
malware can sneak malicious
Trojan horse programs onto
unsecured PCs. Unsuspecting and
unprotected users can also
download Trojans, thinking they
are legitimate game, music player,
movie, and greeting card files.
effects of malware- Malware causes your connection to slow down
Malware causes your computer to slow down; badly written code
can cause your computer to crash. Malware can cause your
computer to display error messages continually. Malware could
cause your computer to be incapable of shutting down or restarting
as it keeps certain processes active.
PHISHING
Phishing is the attempt to obtain
sensitive information such as usernames,
passwords, and credit card details (and,
indirectly, money), often for malicious
reasons, by disguising as a trustworthy
entity in an electronic communication.
effects include--Theft of identity
and users' confidential details.
This could result in financial
losses for users and even prevent
them from accessing their own
accounts. Loss of productivity.
Excessive resource consumption
on corporate networks
(bandwidth, saturated email
systems, etc.).
BRUTE FORCE ATTACK
Brute force (also known as
brute force cracking) is a trial
and error method used by
application programs to
decode encrypted data such as
passwords or Data Encryption
Standard (DES) keys, through
exhaustive effort (using brute
force) rather than employing
intellectual strategies.
effects of a brute force attack
include--access to bank
details,access to social media,
being logged out of accounts
and anything inside
yourcompuet such as files
DENIAL OF SERVICE
an interruption in an
authorized user's access
to a computer network,
typically one caused
with malicious intent.
A Denial of Service (DoS) attack
happens when a service that
would usually work becomes
unavailable. ... The Denial of
Service attacks that we will be
discussing today are called
Distributed Denial of Service
(DDoS), which result from a large
number of systems maliciously
attacking one target.
DATA INTERCEPTION
When packets travel across a network,
they are susceptible to being read,
altered, or “hijacked.” Hijacking occurs
when a hostile party intercepts a
network traffic session and poses as
one of the session endpoints. An
attacker monitors data streams to or
from a target, in order to gather
sensitive information.
EFFECTS--they can access
what ever data your
tranferring
SQL INJECTION
SQL Injection (SQLi) refers to an
injection attack wherein an
attacker can execute malicious
SQL statements (also commonly
referred to as a malicious
payload) that control a web
application's database server
(also commonly referred to as a
Relational Database
Management System – RDBMS).
SQL injection attacks allow attackers to spoof identity,
tamper with existing data, cause repudiation issues such
as voiding transactions or changing balances, allow the
complete disclosure of all data on the system, destroy the
data or make it otherwise unavailable, and become
administrators of the database server. SQL Injection is
very common with PHP and ASP applications due to the
prevalence of older functional interfaces. Due to the
nature of programmatic interfaces available, J2EE and
ASP.NET applications are less likely to have easily
exploited SQL injections. The severity of SQL Injection
attacks is limited by the attacker’s skill and imagination,
and to a lesser extent, defense in depth
countermeasures, such as low privilege connections to
the database server and so on. In general, consider SQL
Injection a high impact seve