0% found this document useful (0 votes)
18 views

CSS unit 3 part 1

....

Uploaded by

Ankush Gaming
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

CSS unit 3 part 1

....

Uploaded by

Ankush Gaming
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Unit -3

loos and Metho Usod in Cybo Cima


in
Toduction - Gyjbx Cind is a nlausful ac litis
central
tuhich Comþu to phy tho
tool
etho as puimavy tagek
that is in like hacking þhishi ng ) sparning ono
oima mployee computex tech nalagy to gon
Un athobizad acce fo þesornal eA ingomati erm,
Conidential business data engaged in malici o,
and onine actiuity.
These ndi uidual ate known hacker and ybe
efto Computet cime.
Tool omd method Use in cybn coime a wide range
of Softwae, haol waxa, techrae used by indiutdua
group ooith engoge
malcious hntent toengag in ilkgal
Qctiuities iothin the digital a
Netuork Attack mident eveal that ttacke a e

oFten vey Systematie lunchin9 the ata ck -


ottack descibe hese
The basie stage of n
e

to undystqnol ha attackr can compomise


a netwok he
) Lnitiat Uncoveing- Two
Tao steþ
first stog
Reconnaj ss qnce. The attack
much os þossible about the tangat
Tha Seond steþ i sesehing the infommation abact
tha tasqtt on th intetnet by google, soeal
nehsting website omd peoplu indr websihe
) Netork Probe- At th netaot probe staze, the
affackoy using 'ping sueap' echnique
to obtain the netusork
network ip addss, þonforn
bororm to
nethod hetb
seek tavget, þort Seanning tosl . He the netork
Hhe atucke to SCan my iþ add3S 0ve4
3) Crossing line towanols electonic Crime- Nou ho aftack
iz toood CornrniHing
hat is technicaly Combuty Cime . He/she does,
this by exþloi tin possibla holes the taxgt
System ." attacky wse
Networt At thia sta|e, the netusrt.
the tha
Cabtuxing attembt to ocon,
Or attemt
hald in tho intHnal networt
The attackey gain a
a foot
quickly andeaay, by com þromising lou) þrioity
next step istmove any
taget system
avidomce of the netaot.
that the attackoy has cabtuwe the
rab the data- No)
netuoock He she takes advntage
of his/ hey bostional steaL confidntial datau s
Custome4 Chedit Catd infornn ations Qnd evem lauch
othon sit
otock ot othe4 site fromm yown netwark , causing
situate
C potential expen slv and nbaras sing
mdividual ano for rganiztlon,
) Covoing Tack Tñis i2 the
atta ck , which vef to the activits
the otackest to extent misuse &
thTool3sytem uoithact being datective
inhohedate kejie
0 PROxy SERUERS AND ANONYM1SER Islu24 cient ar
A as întmeíate bl bich
WseH
evice (Comþutey , smast phone, eto) nd the
intenet when o wset Rquest
RsOMC,the yuest goes thaough
on line
esouMceS the equest
Rquest gos thouyh Hha
Proxy
eaut to th
S0VL than foJard tha
qud the rbons
twget ssUHVL behad?
behal of. the Use
to the
tom the taget s vo iz send back
Seve then to the se
hel4 in msking the u oiginal iþ addess
Seye s essential Cmothi Comþuty within
the netk qn intemediate betwen
o omþut nd
amd otha în tho netuok
An attacker machine connected through ths fry to
ti each othey combuto ( tavet)
tho netuort . Tha
SeH VEH Canry out equest
on the beha! of tha attackey machine. when th
taxget machime on the netalort eevethe
yequests thay dis cem that
that 18ia Caming from
machin but huy unable to catai
the true identity of the attackor machine
The attackoy fhst CoTne ct to the booxy soveU
qnd tab lize
Connection wth the tuvget system
esicting Gonnection with rxy
Worting Of Proy
step-) f the qst data r page aeady S
Hha local cache he
provide Hc
itsel
cquhed nctieva to te client
steb -1) If tho u t dtn or pa doo not xist in the
local cache, tho prry seUN forwad thot
quest to the des tingier sov.
Ste-3) The roxy seMvey transfyy tho
he ebls to tha cliernt
cmd being cachtd to therm.Ihee fore, it
Can be Sed Othat tho proxy sve act as a
tho sev
addats3
client tP add s, tnte
odtess lobal
M-net Pr) Netork
Globa| Nehyosk Client
client
prxy
ig Communicatien withaut fig- (ommunic ation uith

Nesc OR Puspose of roxy Seye

heap the system be hind the cwtain.


iB wsually use to
alcess to
web SeYvey,
Cache the eb þage from
sbeciallzed prony svaduettisement.
Content such s
use2P addess multiblex to
SeyVe be
can be
no. o combutey om tho
Comþutesy
ynabl Connect
intont
Dmpove Sacuaity
monite nd Uset be hauiour nd helbing
wth comþlains
proxy
Load Balancing and Redundency >mulibla SeHve.
distibute ta ffic. cCTDSS

fnonynise that make


An Anornymlsen is a
intetnet umtyacable.

Aronyralso fratect þosally nging infemmaien


An þ vacte infommationy on he wser bahal
An anongmous þroxy 0r
Anong misoy i2 afor to a5
Pivacy seuiee, is tool 0r seyUice that allow ws
to browse tho inte9net uhile kebing thoir idonfifies

and ontine actiuites amonymos Aymison Jork b


masling thetho we tP aches9 and încryting thetr
secrity
tent thafle en AaneingþroxyaivncyoUeXand design
An Anon ymìser ef to to
minimize the datu USeL dis close uhile broUISí n?
the intenet does not grant Cormplete anongriy
Rather t conceYn the deuice ?P addss
fron he website Bn access gnd suhstitute t be a
a illuslon that
that the us 3
diffuent ney
crestingaltnate locati en
brwsng from an
Uses of qm Anonymim
i. friay- Anony misen heltf safe gart yo
intemet
idantyy mating yan
brrod)sing
prroteete unless you willing poude posohal
infomaion online such by pilling out fom
Many govynm
1. Accessing Govemment - Resticted Content
-

restit the
Conten
citzens from acce ssg certain website or
abbroiate or cortoini sensitive data
ConsideH in
în

An Anorymiso, locate d coouget


Qutside
Outside th tget caunty
Caumty
allow acces to thee site ohile þe fae sonui ng

ananymity
Protetion
þrouide
Against Online Attack An Anonymiseoyayious
3
online Fhishing agait attck b outingatl
i% Sece DNS
întesnet traffle through
SeHVe: Ineusion DeBechorn Sysm
aHe offen
) By Passing TDS qmd Fie wall Roles- Firewall
by empliyee
by pass outhori
cegy ze
or student atfemptg to
website an monymise
nonymis sHulce tha oranizahon
connection bl
fiyeaal! by shablizing
Comhutex ond Anoymiser sowica Con se quently
fieaval! only detect he cnechon .blw your
he
tombuty and omonymi se web addess website
Comþut
an onymise Con tan Connect to connchens
ony amd
like tuitex hrough an
qm întonet
daJivey tha
From you organizatin
content to you
tha
Systern .aþpaat Connected to rdthesg
Prosþectie you
eb addss knock the actåa)
anorymise
webslte you wsekoyke
Combufo ka
NefurkPe hi mulHde
of Anonymisoi initlally eute
Netat Anongmison
1 Nehaork Anonymisen - UeN dat though a netuwork
Cempul befon forwTding
of intonet Gonnechd
Websitei
. ie dat passes hrough
to ha întent challenging or
'ombutey making it
svera interna comþutn to stablize a
ottembting to trace the cdato
qny on
clen Ink b/t
when attumphing to vist. webste, Hhe equcst moy
Ex- c
þass tough inteet comþutey A, B, nd
tha website .
yeaching CarnplicafonnCommunicstien make t c
Advarlaye-
anabyis ombex .
Dis advantoge- ny mulli node netort communtcahion
cary a isk of Gomþromizing,
Vongidantaity af each node 18n24
2. Single foint
ng
Anonymison
foint Anonymi sou first diect usor dutou hrough
Shecifie NRbsite baore sonding tit to tha toget
Website. The An onymison collet
collect data from the tget
we bsit and tham
elay t back to the
th roteoking the sr
u identiby
Aduantag Maintoin a dagiee of seboration blw the
Usen informations ond uniq identiio.
Dis advantage 0ffH less egiBtan to advance traic
analysis.
nple of Anarymis - ) Piphon
2) Tunnel baog
3) Utroa surf
) Net proxy SOvet

9Phishing
hing hishing in cybeox setuity is a malicious
tcchniu bed y the cyb coiminad to
trick indiuiduua înto evealing sensitive in fomakiem
SIch asa pass aoord, Cedit Caid no) Social
Secuxity
no., and othy psonal and financinl data

ealize on manupulotien andenjinering stack mat


Stnding nenasga thatlook like
corivencing technin
legitimate Comþan ies
Phishing me,say wil! sually content a tink.
that takes tho UseA to fake Wsey that look lika
I þorson al info.. such o, Hhebr catdit cad no.
h momaion lz Hhan w3 to steal fha peso

tdentity oy to ate foauderrted cha ny


the Credit
bolieve
Phishing introducingin 1996 amd It iz
is atfeynatie shllingwe afish
that phishing infomatien
ing
e
fish megns infonatien . Aftey thot
wsing first documeteo! ord phishing .
yiorting of fhishing to attempt Cime
multipe stob
atfacke wse
dsing phishing tool.
fenning- Coimnol. (ually. colled a phishe a

Step ) mira how


decide the taxgt and defey
to get email addess of hot togt or cwstome
that business. Phishe ofen Use mas
Of
amo addess collection technique
Knou cohich business /busness
phishey
Steb 2) set-up- Once spoof and oho theh vietm
hous e to method for deliwenng
will Coeate
data
data about the
gmd to colle ct the
email
messay
trget tha most offen his involve

adds and web page.


þeople.
Step 3) rifack - Ris i% ha step
oith phishey sends qnd phony
fomiliay wth Phony
that abþea to b fom a reputabl
messag

steb ) Collectien - Phishen record the infomatien o


uicfm's enteing into Web Page
Pop u
windou .
P)Tdenty. heft and Faud
Phishot u, tho
make
PLotchase. of
that tho intomatio1
2othxd to
criminal froed
1.
thi
. Nhalingsking
2,2. Smishngfhishing
tsms) (Target Pead CEo, CFO te)
3. Vishint ( Voica)
4.
Uone phishing ( Coþies of enails and att the infrmation)
Hous to stay ptotestes
I. Authoze Sounce
oginst phishing -
2. Confidentality
3. check RL
4 .
Aod seblaying to Susperious ting
5.
Try to auoid re wifi.
.. Kaap your system
ubdatey
t. Keab th fheual of the system on .
3) PasSword
Cracting ss os red Cracking ,6
Possord Cracking inyolve the at of ndisciþlinry
pas word pass word i8 like
ente k to get an
into (omputized system like
Powword caaking is þoocess of RcoVing pagst
from data thot hae ben store in or
oy tosmited

tranbmitted Encrybtod fomat,


sting bita that i genatd
hash unction.
functien. his
hash fyncn takes the passcoord înput and
brodye an VeUion
encgpted
6f ehiuing password from
dt that i8 sto
a CormpuBen.

Ropose of fassword cracking


forgetten BasswGrd .
1, To ecovey a easly
admmistator to chack for
The system
Crackablu password to a sytem.
unauthorised access
3. To gain gain ass Jod Attack
Mathody n
Conm on
to Attacke Crack tha Passwbrd -
) How
account qn administrator
Such s
a Vaiol iisH
1. Find
or guzat.
guust. bossible pa8S Word .
Ceate a Ust of high to louo
tha pags oord frum
3. Kank Word
4 in each
pass
successsull foss wordis
to gain until oith th
5. To Sometime
found. Password Com be guss nfomatin.
þavsonal
knouuladge of usn DO8, Chedt CaHd no, Phone no.,Uehicle no. )
(

Hou th Atacku
Brute Force Atfack - (rogrammatic) þrogramtic
2)
pa ss word attack utlize a
Brute force Congbinatign. of a paéo
all possi ble
thod to toy eiint for bassarrd
þass word, this method hackeH) length and
that ghot to sthring alphabatie chaact
Tf a passuword has
Cobital (ettenr lo aleH Case odd a it
including
Wold toke &,0,3, |, 8 Lo 176 qusss to
to CoCk
3)
ass wod Sbying -(for pMang Count otAnhinl d tack)
haditarnol brso d atback thot
Passwor
atemb to
shin ncount by uing tho
mang
(ommon
force
password.
Bute
opbasite f Bruto
forca attembt t goin
aythoted to
single accont by epa tHy
Uing the Combinafion
Cedential Stuffing -(Utliza, te stolan Corlentin! for futua lonjir )
Che dentioal studd ih îs an automated Aackng
trchnigue Hat utilize stolen t Credantial. Thoe
Chedential Comomizad o list of
email atess nd pass word T techni que qenall
adobted utomation to f submit (oin equest dictd
against aþplication and to captune Successtll
Hew to
Jogin atftembt tor futune ebloit ation.
A

Protecting Aginst Passworol Cracking


1. Avoid Pass No
2. Do not ha pass Word .
3. Ayoid plane tent s Weak password .
egular paSSWord chamges.
5. ecue PasswWord stoage
6 Do not ube automated pass word eSet

Tool
Ika fa hoi Kaybago and ane
4) Key loe bubale allyt
also known a koy shroke logge
of soffwoa ,
ecordeN , i2, tybo ecords
sroke both Hhat
Combinafion of
Comþute
mobil.
made chaxacts
Stroke
not only ta
includ funcion key and
deuice.
becial key )
albo
tybed but astte han manit
sayeSeczetly
aut. ko
fey boad shot k Ke
wske info iB to seczet
bina usey ke Knowledg strote usithout thair
pypose koy
amd captun
Knowledge tybe of Sby
tecord tcama
Secety kisi mfo- fo þerteut1
malieioussecutive koy strke
2 and steal
that re cord oevice
ente
thot tha uset
stroke legge
3 hat o hat 'nfo ko Churara
explin soffuae
eavesbrot
hatdae
gn Cama
4 yous wateh you
yout smortþhone microþhone.
revie han sh haragioi
let the
Iister uska e cod
cod kiye hote hatn al
s1 f info. ko ttacke captwu
5: The Coim?nal
|cay stroke snsihuo
eutew juy Fypm kata hain 'sice thoou qh
and fase
logge Aadysare awr Sofoae ka
as
churae heu
data ko
6.
anol hatcoptue otht confidential details
bank nfmatten á cy a
în 19 F0
ha fist st Soffusae
bascd
hade devjce nd tha
01 2983. Sinco hen
csvel op
aygge houwe QnVolv to acees

confidential nfo.
soffuiote based koylo
Softuinie based keyloggoy- Satwo
applieakor or 7? roqarn inshal
mobile davice r n in the

backgrund
Sgound and
datu eithor
captwe Key sPeoke y sing
docatly or trommilng i

bhysical dauica inserted betwenn


kuybong n comþutu integroted dcy
into
Kyboamd. Thy intvat and ecord Kuy
stroke
the comþut,
Ihis kuy logye eguied phyical acces to ta ombuh
System. It moy be small handawaL deuice
3i Wieles8 Kay loggey- Wirelkss keylogger intcebt ond
stroke trunsmitted blw
wheless koyfooad and ttå eci. Ty cm
be eithr hose a Softwae based nd
Cabtwe dot sbeless (onneon.

4 Time 8ased Fay loggr -Timu. based kayloag coftu


Kay stroks at sþecifie time
intesva
întval, ecording the intes choacty oithin
hose inteval, Thi helt edue the
dota
5 SMs based Royloggi SMS boased
intrcþt texf ne ssag
soke ente en mobile dawice. Tay can
hnsmit the cobtuwe dote to þocdejined phone
nunm b oY seive.
22|1|24
Treventon from Koy logo
4. Ant kaylogn tnntoahsi n "
Dat, nfomion
2. Anti viyus
FilloA koybpord
3. Automatie fom
t. One ime passworo
atten ox Mou se Kcogaizatian
ice to text (onvetor
25|2|2+
Spy Wae tybe of maliciou
Softwase
Sbyiae i8 a malieious combutr
which collact
tat iz instal on
abot, usen coithout thr Knoude.
nfomation
to acCeSS
design to ord doag
saftwoe
H sþywau
A tho sse
Consent.
withoutpeysona&
deuice
infmatton hat H send to
Colletsensitive
ollection fim, a malicdous acto for
advettirM, dato steal and
it to track
He Attacket (oedit cad
as intenet uses)
WseH dota, such steal
cHdential
qnd bank account doto . Shywae is ane of fhe most
te Scoof thei CAm be dlicutt
that
attack Seiouy
bed Qnd corn oe
busines to identif
business valneability
for (eave
D also
hasm to metuiok . misue often affect
data bieach omd data and slow
to
formqne
davic and netoxk þt

actity maiclau, soffonie Hhat i8 da sign to


and collect mf. from
monltex Gmd H dauice .
H acfivated in back grund, Can data
about Usey onlina
onlina ct vihes , browsing hobi , fasaod
Kay stroke , þeoonal infomaton qnd more
3. sbywe iBis a btach of ybon
socuty
t na he aptop / Comþutey sytem, whenn wN nintentio
Hay click the ndom ynknouwn link or oben or
unknown ath chment
4 PMoy be that atfachnent hold styonU along oit
do cumet
S Shyaa may et into a Comþute Or abtop as a hidden
Comþonent though free or shad SO wCUS
Key chaHactyistic md Asþect of Shyw0
L Stealth y ohoxaion - Difficnlt to dekect by
by
2, Data collectien shyaae collect nfarn ation including
passwsd, login oedntial; btou sing
histoy email contunt, chat lo pesonl infa ond
moe
3. înfomatien (eaka ge- Ik gathered data toansmiteod to
tha atucks sHVOi
muomted
4. Adwae Vs sbyova- Whia Adwa
advextisements sbyusa gaes
this by sayetly collketing en dat.
b Koy logging ond Soeen Captuna some shya Voáent sord
Kay stooke nd take sen
- shof,allow attack to coptyre sunsitlue intomatiôns,
þosdband U3 inactien,
G Financiad fdenty Tiet- ubefinnci/ ibntity thatt C9m be
for flnan ial fraud
manibulate trowse
sling, change the defoutt search
egina , modify Hhe home page Or redbbet the wsey to
malieiu webzite
Typs of spyae
1. Adware- Thia sits on
gdvertisx and maliciou,
then sel| Hhe'r data to
actor and eHUe ub malicious add 2

Kayloggor- Al3o knawn as keyloggot key stroke log11


Keyloggut e type of nfommaion teal spywg..
key strke that
deviee than the data imto an
heir ifected Save
method, colluct all
Infected log file. Thiz sbyujae tybe into their
of the infomation that thewse hyee
text message
devie Such a Qmail data ) þassword,
nd Wset name
Vulneability
3. Kost Kita - These Toot Kita expleic, secuty
into machine as an "administrato.
Root Kta
loqmgoften difficult and euen impossible to oatect,
4Systenm Monitor-These clso track Wser atuity on theis
Comþut csptuaing nfornation Gke email Send,
gnd oth ite risted and key
Socal me dio
Browsey history ko track x|
S. Tracking Cokies
Tratingdeuice cookiea ae dopped onto
b
website Qnd
than Ued to followtha wr online achuity:
G. Trojan Horse Virws- Onine ke through anta hai
Thiz bnd ntet into davice thg
abyuyae ent
trojan mat
malaMe. which sþonsible
tforroagh daijvoxing the sbyue þrograme
Mobile Sbyuwe
mobile devico gtea dato. such as call
spyoe tg fing Contact list, þho to an d short
log, baowst Ristoy
(sMS), centain ybe oill lag ws
me ssage Sevvice
using the device microphone , fak
tako
Keystke tord
photo, ack location using glo bal po|itioning syste n
(GPs) track, ake Control of deuico thaough
Command Send fom sMS msg, ms doato tranfo and
Hacke qn
se mobile sye
emote
isahon through mobie oevico
to beach n gan
Uulnoa bi lities,
not be dakcte by tha
which may not
secuity team.
Keylogg system
monitsr
Adwa
(
/ Tojan
(
Brouse

Gookíe
kijackin
Some Common
Root Kit

onlina Actit

How to protect from Shye


download. abþ from the official so s
s foe
the cheating system Jogle Play
CHnd. official publishe.
gioing þeymission to apþ Hhat tock data
Be caneful about
2. take conto CaYner qnd mero þhon
6 location
Auoid elicking link In emoil nd SMS

Instead of only ent rusted unifourn nouwte2 locot dcH


into the baws addatss ba .

t. Be cuwauLe f nexpected watning mess0


th us4.
oharialy
hose that can not be veied b
S.
Secuify update eoube d to þrotestion from s p .
5) Virus and Wom -
Vius þrogram that exeeuted
coole
DefU i8 a þiece of dlamoge infnation
by ttackt to destoy and
and data':
coby itsl? and
a Combutex poam thst can
com þat without þoumiSsionn or
infecteda
Fnsadga of U. A uhus could potentially
the w.
to clata store on a (omput, exploit
Comupt.to
email þrogram to propagate to othan system, or
eVemn execute comþut data on a hand disk,
of all
2 is a tya of malicious SaftwaMe (malwa) thot
Can teblicate aead by înseyting copy of
Oind
Cnd
itzelf into ctex þrogram, file,
calls to hat to
Comþutor memory tt desim to
system data, soft owe
Corruptng destroying file and abplieatio
Vis can take Some tybical Getionys
!. Delete ih in de system into which uiny untoy
tho

data aystem Jile.


t. Rodiy dalete þosonal
data
3 Stealing sensthive
5:
Mating
the system slow .
Rlling u He disk space unnecesouy
plieate themselue3 to bropogato fothsrhm,
t Foma ting the haud lisk dive auto naficsy
hud
Types of Virus - ad ne (Uital in fomafiorn esouye, ndon seiu)
1 Hle Virs (Pron Virst This type of uirus becorne achve
When the progam file iB executed
Once tha ogram fila get infeot ed, tha virs makes coby
of itsey nd inac tecd the othn þrogram on te
Comþuter system
tt chang the stat of a program B0 that te
Contol jump t
Code Hhe contol etwn to Hhe mun þrogam. t
exeeution iB not even notic. i8 alao caled a
paiasitic Vius becuwse t leave no ile intact but
also eave tha þost funtional
2. Boot Sector Virus- TR Boot Sector Virus is a typ
(Flobby disk ) of Uirus that inect tha boot
Sector
o flopþy disk or the boimavuy boot erd
of had disk. The infected ft Coda n wNhen the
System i8 booted from
fron am
an inected disk, but once
loadad # with în fect otho flopey olisk soit when
accessed m othe comþut. a a type
malwasQ
(shod sheat ile)
3- Maco Vis- 4 t Unlike most VIYWS which a

(ASsembly langug) these ae 0rten in alangug


(onguage tike visual basis These vs e
whan a togam caþade of exeCuting
CXamka- Macn vhu can be contain in sþeoad Sheet
file 02.|1224
Stealth Virus- ft is a veuy toicky viru
(Change the de tecHon
it
it
se to
chon
thot be
the codo
detoction of Uirus becono
datect Hence 9 ho
tho ad
Veuy diicul Exampla chang ask
sytem call Sueh that whentv
to ead Code modified by a vir s thh
show athe than
y Oiginal fomn of code i%
infected coc of Bousr )
(chang vis
5. BrooJSeH Rijacking- Az te sett. non
Sugg st
code d to tagat the
the
the
brows and Cam oltethe bwsen satting .
called edit uhs'
the bow_N
Tt i3 also othe
becaS it ediheet yowH brows to
malio site that hatm yotr Combuto

system. (Control he systum or Compuf)


6. Root kit Vhus- A Root kit Uirus is a tyse of
maluan that install an n Unauthoized
access ingected sstem guing attacksto
fut contol of tho systen with he ability
Or disable functons md
fundamenty modit Wee
Root Kit viws
visi he dtk.
cmtivius softue: Cookies The Small amoum

Yevention fom Virus


I. nstall Anti vius Softasane,
3. Use o fie wall
Ennbla outomatc update
5
Secwe yowr metuoo
Use shong passuwOrd.
Regulay tckup
yowey nd usor.
Audit .
9.
Ragutoax sinity
Soma famous Comþuty Uirus ~

")1 LoVE YoU (Love 8ug) (200)- seod via emay s


(Millon Com þutu) a love lettes , this vi
infected millton of comþut oby csusin
u9tin files qnd
massive finanial damage by ouy

J) Melissa (i999)- Amacn VrUs sþeadl fhrough email


attachment, tit reblicated tt8e amd in
Send înfecte document to the s t 5o,"þeopLe
th viction addess book .

3) wanna Cry (2o11)- A


A RonsomNare
Ran somwae ttack
attuck that exbloid
| Kansomewae )
windows Valneabilities » enoypting
file qnd domanding ansOm . t affected too
Comuten n oyot (50 Counties.
9) Code Red (20of )- A wOm that tageted micosot
r

down intenet taic


dfocing website d
slaw
s) Zeus (200})- A Tojan horse that tget window8
(Tojr her: ) system skealing sensiive infommatier
CaedentiaA and beI5onal dat
such as bamking
Difence between Virus qnd Wom

Viru pieca o code Wom

i. AConbuten wizws
Uius in a bybe. hrt sods
Maluo
of Com þateu þagam of
that, whon exeatteol > itself froyn Campuson to
eplieates itse ond instts Comþutx by eplirating it:l
ode, ulfimately without any humar
fecting the fnetoning intaction
of the comþuter .
A Nom only nea ds to enb
An initiatten i% equed
uhus the douice, thern it ca
by the host, i e, o vhus
speods only when auto mateally affect tha ct
" No
ingetd pogram is execu files and þrograms
tet m davice. execution is nee da d
few difenent +ypes o feus of th difforent types
Comþut vnses include
Boot Seto VirWs follo wB:
Itemet Womd
Instant messaging worm ete.
File bnfector Uus ete.
t: Time taken by a viru AWom
A con quek9 sead
to spread in the Byster deuice
t6 lezs e in conmþaisi trrough
to a Womn.

5. Examblb of Comþuteu Erampls of comput


Uinus înclud Creebe îheludo. Mois wom, Stoym
Blaste,SlammeH ete.

6. he full fom of tha Vhus Woms stand for Wite -


IB Uital fnformation once Read - plony .
Resoce Undon sicge
Woms e exe cuted Hraough
WeakneB8es in th
hrgh ereutable files
data
o3 224
WoTmComput4 wom form of MaliciaUs softuoe
con taminate
dasiGthogn to autornomous e odace. nd
comþat system hilb. nintaning itz
fune itn-
the infected deico. ConhufeH wsrm
to Conputoy thot hue
*hlieate thamg} to probagate
been ineted .
gpieal acion fugommed by i
1. Nom i8 selfsety et eblieottng combuten Vins .
Nom i haimfal softwse that ebeat tsey
S t more om one comþute to qnothex combut.
3. t leguing coby of itsel in each comput memoy
nd stea
+ Hwom find corbutey ulneabilities
ilness hsugh^ ite as5ociafes netuork
an lRgs
new Vulnabilie
5.
ia loking for entry point
in the Computy systeum.
6 Wom stead by emal attachment, and hide
t#ems,ey into ofha tink , ile, softuoae, othn

gpa of Comþute Won -


1. Intemet Wom
designed to attack rrominnt
website that hawe Weak

ineded comhutn Vieung h wiehsite


infeckd ha site. Intonet On
to othen do vice conncched to tho
intetn of drd priuate intemat
Conne ctien.
E-mad Wbm -
out botnd
Coeato p nd
lo sprea, emoal womn Coeato ano Confact lint
în
message to al adctaess
a

the moil , t Contain a


When the ecibitent
sben
eKecutalo lo hat ine cted tha neu
maliciou
System. sl1lat
3. File -Shaing maiciows þrogranm that
ide
fie shaing of the most wel
known
as meoia ile. Ona Thee iz to b t , on that
Com þutes wom of all tine.
fle
infected with tha host
by USB device
sþra
& malwae cmd secOnd one is propogate. or tagget
zatior such as þower supþly Seyvíce,
îndusties or organi
Supply souice, þlanta ete .
tWt supply
Ui dao, lmage, ext file, document, UsB device
Vi

Prevention from (omputt wom


1. Keap software ubalate
2, Use c fual!
Rotall a iable antvirus an d qnti malue sotwae.
3,

4- £natble utomatle ubdote .


Use strong & unique þasword .

Regulon Eackup ond ROURUY þoud we


Bnpleent emoil ltening
9. Monito metoork traic.
Regul secunity audit
9, rojam hozse and Back Door
a rrograrn in ohich.
Iroan Hoyse - hojan iose ia (ontain
haomdul tode i u
data in such
inside , havimlessCanþrngamnin?
gt ontol
Way that t can
Malwaoe that hide themewe
Ian Horse lz au
othy nomal progrm that lke too k a
nto
nomal actiuity Horse iz deive from the cient
Tha ane rojon whe Goeek wse
trojan w.
fait of tha
of troy
to descibe Woo dan horse to the ity
Knd of Malwase Hhat cownloa
lan Horse i3
n to Comþutu legtimet: SSwes
Borme Tybical Action takan by Frojan
1. Thay C4bt datau on a
Comput
Ihuy helt to sbNad othon malwabe such y Uiws,

3. Thy. da actvat interfe wth qtievies


d malwae fro yam,
4 The al low Rmoe access to Yor ompte
Ihuy uload nd download le wthout

email addRs nd wse hm for starn.


Thay coty fota linik to fulse website , diplag
soundVido imag.
, estat
Thay slo ) w douon estat shut down the

You might also like