There has three types of software attacks. Firstly, Remote
Attacks Requiring User Action. Which has Virus, Worm,
Phishing Attack, Spear Phishing Attack. Secondly, Remote
Attacks Needing No User Action. Which has Denial of
Service Attack, Distributed Denial-of-Service Attack and lastly, Attacks
by a Programmer Developing a System. Which has Trojan Horse,
Back Door, and Logic bomb. Okay now, let's go deeply on the term...
Remote Attacks Requiring User Action
- Virus : Segment of computer code that performs malicious action by
attaching to another computer program,
- Worm : Segment of computer code that performs malicious action and
will replicate, or spread by itself.
- Spear Phishing Attack : Phishing attack target large group of people.
In spear phishing attacks, the perpetrators find out as much information
about an individual as possible to improve their chances that phishing
techniques will be able to obtain sensitive, personal information
- Phishing Attack : Phishing attack use deception to
acquire sensitive personal information by masquerading as
official-looking e-mails or instant messages.
Remote Attacks Needing No User Action.
- Denial of Service Attack : Attacker send so many information requests
to a target computer system that the target cannot handle
them successfully and typically crashes.
- Distributed Denial-of-Service Attack : An attacker first takes over
many computers, typically by using malicious software. These computer are
called zombies or bots. The attacker uses these bot-which form a botnet-
to deliver a coordinated stream of information request to a target
computer, causing it to crash.
Attacks by a Programmer Developing a System.
- Trojan Horse : Software programs that hide in other computer and
reveal their designed behavior only when they are activated.
- Back Door : Typically a password, known only to the attacker, that
allow him or her to access a computer system at will, without having to go
through any security procedures.
- Logic bomb : Segment of computer code that is embedded within an
organization's existing computer programs and is designed to active and
perform a destructive action at a certain time or date.
Author : R. Kelly & Casey G. Cegielski, 2013,
Introduction to Information System
So that still have
several ways to avoid software attact. Firstly, Install Anti Virus
Software. There are many good Anti Virus
programs available. For your convenience, two possible selections are listed on
Useful Links. You can also check the West Coast Labs & ICSA web sites to
see which Anti Virus programs have been certified. Make your choice, install it
and keep it active.Secondly, Keep your Anti Virus program current. If
your program is more than a year old, you may be at risk. If you install Anti
Virus software but ignore it, it will quickly become obsolete. Watch for
upgrades. When a newer version of your program comes out, buy it. The upgrade will
intercept the newest viruses. Thirdly, Between upgrades, update your
Virus Definitions often. New viruses are being written every day!
Therefore, Anti Virus companies are updating their virus definitions
frequently. PC Technical suggests you update your virus definitions twice a
week. While most Anti Virus programs will update automatically, you should
check to make sure it is working properly. Automatic updates have been know to
fail.And lastly, Scan your system weekly. Anti Virus software can
only protect our computer systems if we use it regularly. If your program gives
you a warning, let the software fix the problem. Follow up with a complete
virus scan.
No comments:
Post a Comment