Submitted To: Ma'am Hira Sami Submitted By: Rao Numan Yousuf Roll No F19M2Mb02 Q#1
Submitted To: Ma'am Hira Sami Submitted By: Rao Numan Yousuf Roll No F19M2Mb02 Q#1
Computer viruses are pieces of software that are designed to be spread from
downloaded from specific websites with the intent to infect your computer —
network. Viruses are known to send spam, disable your security settings,
corrupt and steal data from your computer including personal information such
Rogue security software is malicious software that mislead users to believe there is a
computer virus installed on their computer or that their security measures are not up to
Computer worms are pieces of malware programs that replicate quickly and spread
from one computer to another. A worm spreads from an infected computer by sending
itself to all of the computer’s contacts, then immediately to the contacts of the other
computers.
A DoS attack is performed by one machine and its internet connection, by flooding a
website with packets and making it impossible for legitimate users to access the content
of flooded website. Fortunately, you can’t really overload a server with a single other
server or a PC anymore. In the past years it hasn’t been that common if anything, then
forceful.
5. Phishing
Phishing is a method of a social engineering with the goal of obtaining sensitive data
such as passwords, usernames, and credit card numbers.
The attacks often come in the form of instant messages or phishing emails designed to
appear legitimate. The recipient of the email is then tricked into opening a malicious link,
which leads to the installation of malware on the recipient’s computer.
6. Rootkit
Rootkit is a collection of software tools that enables remote control and administration-
level access over a computer or computer networks. Once remote access is obtained,
the rootkit can perform a number of malicious actions; they come equipped with key