Cyber War N Threats
Cyber War N Threats
Cyber War N Threats
There is debate on whether the term "cyber warfare" is accurate, with some experts
stating that "there is no cyber war," and that the word is "a terrible metaphor." Other
experts, however, contradict that stance, and point out that "the country was already in
the midst of a cyber war — and was losing it."[
Methods of attack
There are several methods of attack in cyber warfare; this list is ranked in order of mildest to
most severe.
• Cyber espionage: Cyber espionage is the act or practice of obtaining secrets (sensitive,
proprietary or classified information) from individuals, competitors, rivals, groups,
governments and enemies also for military, political, or economic advantage using illegal
exploitation methods on internet, networks, software and or computers.
• Web vandalism: Attacks that deface web pages, or Denial-of-Services attacks. This is
normally swiftly combated and of little harm.
• Propaganda: Political messages can be spread through or to anyone with access to the
internet or any device that receives digital transmissions from the Internet to include cell
phones, PDAs, etc.
• Gathering data: Classified information that is not handled securely can be intercepted
and even modified, making espionage possible from the other side of the world.
• Distributed Denial-of-Services: Large numbers of computers controlled by one person
launch a DOS attack against systems. The overwhelming number of attempted accesses
crowds out legitimate users who need to access the service.
• Equipment disruption: Military activities that use computers and satellites for
coordination are at risk from this type of attack. Orders and communications can be
intercepted or replaced, putting soldiers at risk.
• Attacking critical infrastructure: Power, water, fuel, communications, commercial and
transportation are all vulnerable to a cyber attack.
• Compromised Counterfeit Hardware: Common hardware used in computers and
networks that have malicious software hidden inside the software, firmware or even the
microprocessors.
“Cyber crime is now a global issue. It has evolved significantly and is no longer just a threat to
industry and individuals but increasingly to national security. . . . Attacks have progressed from
initial curiosity probes to well-funded and well-organized operations for political, military,
economic and technical espionage," said by McAfee VP Jeff Green.
CYBER THREATS
Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to
deployments, by known terrorist organizations, of disruption attacks against information systems
for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to
identify any instances of cyberterrorism. Cyberterrorism can also be defined much more
generally, for example, as “The premeditated use of disruptive activities, or the threat thereof,
against computers and/or networks, with the intention to cause harm or further social,
ideological, religious, political or similar objectives. Or to intimidate any person in furtherance
of such objectives.” This broad definition was created by Kevin G. Coleman of the Technolytics
Institute.[1] The term was coined by Barry C. Collin
Computer Virus:
A computer virus is a computer program that can spread across computers and networks by
making copies of itself, usually without the user’s knowledge. Viruses can have harmful side
effects. These can range from displaying irritating messages to deleting all the files on your
computer.
VIRUS EFFECTS AND VIRUS RISKS
A virus program has to be run before it can infect your computer. Viruses
have ways of making sure that this happens. They can attach themselves to other programs or hide
in code that is run automatically when you open certain types of files. You might receive an
infected file on a disk, in an email attachment, or in a download from the internet. As soon as you
launch the file, the virus code runs. Then the virus can copy itself to other files or disks and make
changes on your computer.
Virus writers don’t gain in financial or career terms; they rarely achieve
real fame; and, unlike hackers, they don’t usually target particular victims, since viruses spread too
indiscriminately. Virus writers tend to be male, under 25 and single. Viruses also give their writers
powers in cyberspace that they could never hope to have in the real world.
MALWARE
Malware is a general term for any malicious software which comes in thousand of variants thus
malware is a threat to a PC. Among the variants of computer malicious software including Trojan
horse, spyware, computer worm, keylogger, rootkit, dialer, rogue security tool, adware and virus.
Some types of PC theats are easy to move. However some malware are tough to be deleted and you
need to use combination of few security tools to remove them such as antivirus, spyware removal
software, firewal and standalone PC infection remover.
Malware could cause damage to any infected computer such as loss of important documents
Trojan horses
Trojan horses are programs that do things that are not described in their
specifications The user runs what they think is a legitimate program, allowing it to carry out
hidden, often harmful, functions. For example, Troj/Zulu claims to be a program for fixing the
‘millennium bug’ but actually overwrites the hard disk. Trojan horses are sometimes used as a
means of infecting a user with a computer virus.
Backdoor Trojans
Worms
Worms are similar to viruses but do not need a carrier (like a macro or a boot sector).They are
subtype of viruses. Worms simply create exact copies of themselves and use communications
between computers to spread. Many viruses, such as Kakworm (VBS/Kakworm) or Love Bug
(VBS/LoveLet-A), behave like worms and use email to forward themselves to other users.
Spyware
Spyware is a type of malware that is installed on computers and that collects information
about users without their knowledge. The presence of spyware is typically hidden from the user.
Typically, spyware is secretly installed on the user's personal computer. Sometimes, however,
spywares such as key loggers are installed by the owner of a shared, corporate, or public
computer on purpose in order to secretly monitor other users.
While the term spyware suggests software that secretly monitors the user's behavior, the functions
of spyware extend well beyond simple monitoring. Spyware programs can collect various types of
personal information, such as Internet surfing habits and sites that have been visited, but can
also interfere with user control of the computer in other ways, such as installing additional software
and redirecting Web browser activity. Spyware is known to change computer settings, resulting
in slow connection speeds, different home pages, and/or loss of Internet or functionality of other
programs. In an attempt to increase the understanding of spyware, a more formal classification of
its included software types is captured under the term privacy-invasive software.
Rootkit
Boot sector viruses were the first type of virus to appear. They spread by modifying the boot
sector, which contains the program that enables your computer to start up. When you switch on,
the hardware looks for the boot sector program – which is usually on the hard disk, but can be on
floppy or CD – and runs it. This program then loads the rest of the operating system into
memory. A boot sector virus replaces the original boot sector with its own, modified version
(and usually hides the original somewhere else on the hard disk). When you next start up, the
infected boot sector is used and the virus becomes active. You can only become infected if you
boot up your computer from an infected disk, e.g. a floppy disk that has an infected boot sector.
Many boot sector viruses are now quite old. Those written for DOS machines do not usually
spread on Windows 95, 98, Me, NT or 2000 computers, though they can sometimes stop them
from starting up