0% found this document useful (0 votes)
26 views3 pages

Submitted To: Ma'am Hira Sami Submitted By: Rao Numan Yousuf Roll No F19M2Mb02 Q#1

Some security risks that may be encountered if addressed after system completion include computer viruses, rogue security software, computer worms, DOS and DDOS attacks, phishing, and rootkits. Computer viruses, worms, and rogue security software can infect and mislead users. DOS and DDOS attacks can flood websites to make them inaccessible. Phishing tricks users into providing sensitive data. Rootkits enable remote control and administration of computers.

Uploaded by

Muhammad Saifal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views3 pages

Submitted To: Ma'am Hira Sami Submitted By: Rao Numan Yousuf Roll No F19M2Mb02 Q#1

Some security risks that may be encountered if addressed after system completion include computer viruses, rogue security software, computer worms, DOS and DDOS attacks, phishing, and rootkits. Computer viruses, worms, and rogue security software can infect and mislead users. DOS and DDOS attacks can flood websites to make them inaccessible. Phishing tricks users into providing sensitive data. Rootkits enable remote control and administration of computers.

Uploaded by

Muhammad Saifal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Software Engineering Assignment #4

Submitted To: Ma’am Hira Sami


Submitted By: Rao Numan Yousuf
Roll No F19M2MB02
Q#1: Explain some of the problems that might be
encountered if you try to address security risk after a system
is completed?
1.Computer virus

Computer viruses are pieces of software that are designed to be spread from

one computer to another. They’re often sent as email attachments or

downloaded from specific websites with the intent to infect your computer —

and other computers on your contact list — by using systems on your

network. Viruses are known to send spam, disable your security settings,

corrupt and steal data from your computer including personal information such

as passwords, even going as far as to delete everything on your hard drive.

2.Rogue security software

Rogue security software is malicious software that mislead users to believe there is a

computer virus installed on their computer or that their security measures are not up to

date. Then they offer to install or update users’ security settings.


3.Computer worm

Computer worms are pieces of malware programs that replicate quickly and spread

from one computer to another. A worm spreads from an infected computer by sending

itself to all of the computer’s contacts, then immediately to the contacts of the other

computers.

4.DOS and DDOS attack

A DoS attack is performed by one machine and its internet connection, by flooding a

website with packets and making it impossible for legitimate users to access the content

of flooded website. Fortunately, you can’t really overload a server with a single other

server or a PC anymore. In the past years it hasn’t been that common if anything, then

by flaws in the protocol.

A DDoS attack, or distributed denial-of-service attack, is similar to DoS, but is more

forceful.

5. Phishing

Phishing is a method of a social engineering with the goal of obtaining sensitive data
such as passwords, usernames, and credit card numbers.

The attacks often come in the form of instant messages or phishing emails designed to
appear legitimate. The recipient of the email is then tricked into opening a malicious link,
which leads to the installation of malware on the recipient’s computer.

6. Rootkit
Rootkit is a collection of software tools that enables remote control and administration-

level access over a computer or computer networks. Once remote access is obtained,

the rootkit can perform a number of malicious actions; they come equipped with key

loggers, password stealers and antivirus disablers.

You might also like