Sunday, 14 April 2013

TYPES OF SOFTWARE ATTACKS



There has three types of software attacks. Firstly, Remote Attacks Requiring User Action. Which has Virus, Worm, Phishing Attack, Spear Phishing Attack. Secondly, Remote Attacks Needing No User Action. Which has Denial of Service Attack, Distributed Denial-of-Service Attack and lastly, Attacks by a Programmer Developing a System. Which has Trojan Horse, Back Door, and Logic bomb. Okay now, let's go deeply on the term...

Remote Attacks Requiring User Action
  1. Virus : Segment of computer code that performs malicious action by attaching to another computer program,
  2. Worm : Segment of computer code that performs malicious action and will replicate, or spread by itself.
  3. Spear Phishing Attack : Phishing attack target large group of people. In spear phishing attacks, the perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will be able to obtain sensitive, personal information
  4. Phishing Attack : Phishing attack use deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.
Remote Attacks Needing No User Action. 

  1. Denial of Service Attack : Attacker send so many information requests to a target computer system that the target cannot handle them successfully and typically crashes.
  2. Distributed Denial-of-Service Attack : An attacker first takes over many computers, typically by using malicious software. These computer are called zombies or bots. The attacker uses these bot-which form a botnet- to deliver a coordinated stream of information request to a target computer, causing it to crash.
Attacks by a Programmer Developing a System. 
  1. Trojan Horse : Software programs that hide in other computer and reveal their designed behavior only when they are activated.
  2. Back Door : Typically a password, known only to the attacker, that allow him or her to access a computer system at will, without having to go through any security procedures.
  3. Logic bomb : Segment of computer code that is embedded within an organization's existing computer programs and is designed to active and perform a destructive action at a certain time or date.
Author : R. Kelly & Casey G. Cegielski, 2013, Introduction to Information System

So that still have several ways to avoid software attact. Firstly, Install Anti Virus Software. There are many good Anti Virus programs available. For your convenience, two possible selections are listed on Useful Links. You can also check the West Coast Labs & ICSA web sites to see which Anti Virus programs have been certified. Make your choice, install it and keep it active.Secondly, Keep your Anti Virus program current. If your program is more than a year old, you may be at risk. If you install Anti Virus software but ignore it, it will quickly become obsolete. Watch for upgrades. When a newer version of your program comes out, buy it. The upgrade will intercept the newest viruses. Thirdly, Between upgrades, update your Virus Definitions often. New viruses are being written every day! Therefore, Anti Virus companies are updating their virus definitions frequently. PC Technical suggests you update your virus definitions twice a week. While most Anti Virus programs will update automatically, you should check to make sure it is working properly. Automatic updates have been know to fail.And lastly, Scan your system weekly. Anti Virus software can only protect our computer systems if we use it regularly. If your program gives you a warning, let the software fix the problem. Follow up with a complete virus scan.


No comments:

Post a Comment