Unit1 Computer Security Threats
Unit1 Computer Security Threats
The 11 most common computer security threats… And what you can do to protect
yourself from them.
Contrary to popular belief, you are not safe with antivirus software alone. Cyber-criminals
and unscrupulous businesses are constantly devising new ways to hijack your computer,
capture your personal information or steal your money. In this article, we profile the 11 most
common security threats, classified by prevalence in descending order, and what you can do
to protect yourself from them. In our article titled Designing Your Own Computer Security
Architecture For Total Protection we examine how you can put in place a simple yet
comprehensive infrastructure to protect yourself from ALL types of threats.
1
THREAT #1: VIRUS
Description:
A virus is a piece of software that can replicate itself and infect a computer without the
permission or knowledge of the user. A virus can only spread when it is transmitted by a user
over a network or the Internet, or through removable media such as CDs or memory sticks.
Viruses are sometimes confused with worms and Trojan horses, or used incorrectly to refer to
malware.
1. Using a list of virus signature definitions: the antivirus software examines files
stored in memory or on fixed or removable drives and compares them against a
database of known virus “signatures” e.g. source code patterns. This protection is only
effective against known viruses and users must keep their signature files up-to-date in
order to be protected.
2. Using a heuristic algorithm to detect viruses based on behavioral patterns:the
advantage of this method is that it can detect viruses that were not previously known
or for which a signature does not yet exist.
Apart from directly detecting and removing viruses, users can minimize damage by
making regular backups of data and the operating system on different media. These
backups should be kept disconnected from the system (most of the time), be read-only
or not be accessible for other reasons (for instance because they use different file
systems).
To restore a system that has been infected by a virus, Windows XP and Windows
Vista provide a tool known as System Restore. This tool restores the registry and
critical system files to a previous checkpoint (point in time).
Description:
SPAM is electronic junk email. The amount of spam has now reached 90 billion messages a
day. Email addresses are collected from chat rooms, websites, newsgroups and by Trojans
which harvest users’ address books.
SPIM is spam sent via instant messaging systems such as Yahoo! Messenger, MSN
2
Messenger and ICQ.
SPIT is Spam over Internet Telephony. These are unwanted, automatically-dialed, pre-
recorded phone calls using Voice over Internet Protocol (VoIP).
Prevention, detection and removal:
ISPs attempt to choke the flood of spam by examining the information being sent and traffic
patterns. User systems may use spam filters to screen out email messages with suspect titles
or from suspect persons, as well email messages from blocked senders.
Description:
Phishing (pronounced “fishing”) is a common form of spoofing in which a phony web page
is produced that looks just like a legitimate web page. The phony page is on a server under
the control of the attacker. Criminals try to trick users into thinking that they are connected to
a trusted site, and then harvest user names, passwords, credit card details and other sensitive
information. eBay, PayPal and online banks are common targets. Phishing is typically carried
out by email or instant messaging. The email message claims to be from a legitimate source
but when the user clicks on the link provided, he or she lands on the fake web page.
Description:
Spyware is software that is secretly installed on a computer without the user’s consent. It
monitors user activity or interferes with user control over a personal computer.
Danger level: High
Prevalence: High
3
Prevention, detection and removal: Anti-spyware programs can combat spyware in two
ways:
1 Real-time protection: these programs work just like anti-virus software. They scan all
incoming network traffic for spyware software and block any threats that are detected.
2 Detection and removal: users schedule daily, weekly, or monthly scans of their
computer to detect and remove any spyware software that has been installed. These
antispyware programs scan the contents of the Windows registry, operating system files, and
programs installed on your computer. They then provide a list of threats found, allowing the
user to choose what to delete and what to keep.
Some popular antispyware programs are Spybot - Search & Destroy, PC Tools’ Spyware
Doctor, as well as commercial offerings from Symantec, McAfee, and Zone Alarm.
Description:
A keylogger is a software program that is installed on a computer, often by a Trojan horse or
virus. Keyloggers capture and record user keystrokes. The data captured is then transmitted to
a remote computer.
4
THREAT #6: ADWARE
Description:
Description:
A Botnet (also called a “zombie army”) is a collection of software robots, or bots, that run
automated tasks over the Internet. The term “botnet” is generally used to refer to a distributed
network of compromised computers (called “zombie computers”). These “zombies” typically
run programs such as worms, Trojan horses, or backdoors. Botnets are frequently used to
launch Distributed Denial-of-Service (DDoS) attacks against websites. Newer bots can
automatically scan their environment and propagate themselves using vulnerabilities and
weak passwords.
Experts estimate that as many as one in four personal computers connected to the Internet has
become part of a botnet. Several botnets have been found and removed from the Internet such
as a 1.5-million node botnet recently discovered by the Dutch police.
5
Detection focuses on either the computer itself or the network. Both approaches use trial and
error to try to identify bot behavior patterns. Network-based approaches then shutdown
servers or re-direct DNS entries. Security companies such as Symantec, Trend Micro,
FireEye, Simplicita and Damballa offer products to stop botnets. With the exception of
Norton Antibot (formerly Sana Security), most focus on protecting enterprises and/or ISPs
rather than the systems of individual users.
6
A blended threat is a threat that combines different malicious components, such as a worm,
a Trojan horse and a virus. In this way, a blended threat uses multiple techniques to attack
and propagate itself.
Worst case damage:
See respective entries for worm, Trojan horse and virus.
Prevention, detection and removal:
See respective entries for worm, Trojan horse and virus.
Firewalls: Firewalls follow simple rules to allow or deny protocols, ports or IP addresses.
Some firewalls offer a built-in emergency mode. If the number of incoming packets per
second exceeds a set value for more than the specified time, the firewall classifies it as a DoS
attack and switches to emergency mode. In this mode, all inbound traffic is blocked except
previously established and active connections, but outbound traffic is allowed.
Routers and Switches: These can be configured to cut off traffic and prevent the DoS
attack from flooding the network.
IPS-based prevention: Intrusion-prevention systems (IPS) are effective if the attacks have
signatures associated with the