Cyber Forensics & Investigation: Types of Security Attacks
Cyber Forensics & Investigation: Types of Security Attacks
Dr. Aju D
Vellore Institute of Technology, Vellore
Types of Security Attacks
Viruses
Worms
Trojans
Types of Security Attacks: Viruses
• Virus is a malicious program able to inject its code into other programs /
applications or data files and the targeted areas become "infected".
• Installation of a virus is done without user's consent, and spreads in form
of executable code transferred from one host to another.
Resident virus
Polymorphic virus
Non-resident virus
Metamorphic virus
Boot sector virus
Stealth virus
Macro virus
Companion virus
File-infecting virus (file infector)
Cavity virus
Types of Security Attacks: Worms
• In its design, worm is quite similar to a virus - considered even its sub-
class.
• Unlike the viruses though worms can reproduce / duplicate and spread
by itself.
Types of Security Attacks: Worms
Types of Worms
The most common categorization of worms relies on the method how they
spread.
Remote Access Trojans (RAT) aka Backdoor.Trojan
Trojan-DDoS
Trojan-Proxy
Trojan-FTP
Destructive Trojan
Security Software Disabler Trojan
Info Stealer (Data Sending/ Stealing Trojan)
Keylogger Trojan
Trojan-PSW (Password Stealer)
Trojan-Banker
Trojan-IM,.. etc..
Other Security Threats
Malware
Rootkit
Spyware
Tracking cookies
• Tracking cookies
Other Security Threats
Riskware
Adware
Creepware
Creepware is a term used to describe activities like spying others
through webcams (very often combined with capturing pictures),
tracking online activities of others and listening to conversation over
the computer's microphone and stealing passwords and other data.
Blended threat