Abma Computer Engineering Unit 2 (Outcome 2 and 3)
Abma Computer Engineering Unit 2 (Outcome 2 and 3)
UNIT 2
Malware, short for malicious software, encompasses various types of harmful software designed
to disrupt, damage, or gain unauthorized access to computer systems. Here’s a comparison of
some common types of malware:
Detailed Overview
Virus
o Behavior: Infects files and can corrupt data.
o Impact: Can lead to data loss, system crashes, and unauthorized access.
Worm
o Behavior: Self-replicating and can spread quickly across networks.
o Impact: Can consume bandwidth and slow down or crash networks.
Trojan
Behavior: Misleading in nature; often used to steal sensitive information or install
o
other malware.
o Impact: Can lead to data theft or system compromise.
Spyware
o Behavior: Operates silently in the background to gather information.
o Impact: Privacy invasion and potential identity theft.
The motivations behind the creation of malware can vary widely among authors, and they can be
classified into several categories:
Financial Gain
o Many malware authors create programs to steal personal information, such as
credit card details and banking credentials, to sell on the dark web or for direct
financial theft.
o Reference: McClure, S., Scambray, J., & Kurtz, G. (2012). Hacking Exposed: Network
Security Secrets & Solutions (7th ed.). New York; London: McGraw-Hill.
Corporate Espionage
o Some malware is developed to infiltrate corporate networks to steal trade secrets
or sensitive information, often for competitive advantage.
o Reference: Gollmann, D. (2011). Computer Security (3rd ed.). Chichester: John Wiley &
Sons.
Political Activism
o Hacktivists may develop malware as part of their agenda to promote political
causes, disrupt services, or protest against entities they oppose.
o Reference: Engebretson, P. (2011). The Basics of Hacking and Penetration
Testing: Ethical Hacking and Penetration Testing Made Easy. Waltham:
Syngress.
o •
Revenge or Personal Vendettas
o Personal motivations can drive individuals to create malware to harm a specific
person or organization as a form of retribution.
o Reference: Bosworth, S., Kabay, M. E., & Whyne, E. (2009). Computer Security Handbook
(5th ed.). Hoboken: John Wiley & Sons.
Experimentation and Skill Development
o Some authors create malware simply to test their skills, learn about
vulnerabilities, or for academic purposes, without any malicious intent.
o Reference: Lehtinen, R., Russell, D., & Gangemi, G. T. (2006). Computer Security Basics
(2nd ed.). Sebastepol: O’Reilly.
Ideological Reasons
o Certain groups may create malware to spread their ideology, disrupt services of
organizations they view as unethical, or promote a specific agenda.
o Reference: Shimonski, R. J. (updated 2004). What You Need to Know About Intrusion
Detection Systems. WindowSecurity.com. [online] Available at:
<www.windowsecurity.com/articles/what_you_need_to_know_about_intrusion_detect
ion_systems.html> [Accessed 4 December 2012].
Fun and Challenge
o For some, the creation of malware is seen as a challenge or a way to gain
recognition within certain communities, such as hacker forums.
o Reference: Todd, B. (2000). Distributed Denial of Service Attacks. Linux Security. [online]
Available at: <www.linuxsecurity.com/resource_files/intrusion_detection/ddos-
whitepaper.html> [Accessed 4 December 2012].
c. Compare different attack vectors, the reasons why email is a popular vector
Attack vectors refer to the methods or pathways through which an attacker can gain unauthorized
access to a system or network. Common vectors include:
i. Phishing: Deceptive emails that trick users into providing sensitive information.
ii. Malware Delivery: Emails containing malicious attachments or links that install
malware.
iii. Social Engineering: Manipulating individuals into revealing confidential information.
iv. Credential Theft: Exploiting weak or reused passwords through email-based attacks.
i. Widespread Use:
Email is ubiquitous in both personal and professional communications, making it
a prime target for attackers.
Most individuals and organizations rely heavily on email for day-to-day
operations.
ii. Low Technical Barrier:
Crafting phishing emails or sending malicious attachments does not require
advanced technical skills.
Attackers can easily use templates or existing malware to execute attacks.
iii. Trust and Familiarity:
Users often trust emails from known contacts or organizations, making them
susceptible to deceit.
Attackers exploit this trust to bypass security measures.
iv. Anonymity for Attackers:
Email allows attackers to remain anonymous, making it difficult for victims to
trace the source of an attack.
The ability to spoof email addresses adds to this anonymity.
v. Easily Automated:
Email attacks can be automated at scale, allowing attackers to reach thousands of
potential victims simultaneously.
Tools and services are available to facilitate mass email campaigns.
a. Symptoms of attack can include heavy CPU processing, too much RAM being
consumed, high network activity, system running more slowly/performance
degradation, unable to enter standby mode, programs taking longer than usual to open
b. Sudden pop-up error messages, home of browser changed, email account sending
message with virus to contacts, antivirus no longer updating
Description: Unauthorized changes to the default home page or search engine settings can
signal browser hijacking.
Indicators:
The browser opens to an unfamiliar website or search engine instead of the
configured home page.
Users are redirected to suspicious sites when attempting to access known URLs.
Description: If an email account is compromised, it may send out malicious emails to the
user's contacts without their knowledge.
Indicators:
Contacts reporting suspicious emails received from the account, often containing
unexpected attachments or links.
The user noticing sent messages in their "Sent" folder that they did not compose.
Description: Attackers may gain unauthorized access to networks and computer systems,
often exploiting vulnerabilities.
Impact:
Data Breaches: Sensitive information, such as personal data or intellectual
property, can be stolen or exposed.
Loss of Control: Organizations may lose control over their systems, leading to
potential exploitation or manipulation.
v. Impact on E-Commerce
d. Unauthorized intrusions networks and computer systems and Denial of Service attacks,
theft of information
i. Unauthorized Intrusions
Description: Unauthorized intrusions occur when attackers gain access to networks and
computer systems without permission, often exploiting vulnerabilities or using stolen
credentials.
Impact:
Data Breaches: Sensitive information, including personal, financial, and
proprietary data, can be stolen. This can lead to identity theft and financial fraud.
Loss of Control: Organizations may lose control over their systems, allowing
attackers to manipulate, delete, or exfiltrate data.
Reputation Damage: Public knowledge of a breach can severely damage an
organization’s reputation, leading to loss of customer trust and loyalty.
Legal Consequences: Organizations may face lawsuits and regulatory penalties
for failing to protect sensitive information.
Description: Cyber-attacks often aim to steal sensitive information, which can include
personal data, financial records, and trade secrets.
Impact:
Identity Theft: Stolen personal information can be used to impersonate
individuals, leading to financial loss and credit damage.
Corporate Espionage: Theft of proprietary information can give competitors an
unfair advantage, harming the original organization’s market position.
Regulatory and Compliance Issues: Organizations may face scrutiny and penalties
for failing to protect sensitive data, particularly if they are subject to regulations
like GDPR or HIPAA.
e. Impact on e-commerce including theft of credit card details and loss of consumer
trust/willingness to engage in e-commerce
Description: Cyber-attacks targeting e-commerce platforms often aim to steal credit card
information and other payment details from customers.
Impact:
Financial Loss for Consumers: Victims of credit card theft may face
unauthorized charges, leading to financial hardship and stress.
Chargebacks for Merchants: E-commerce businesses may incur chargebacks
when customers dispute fraudulent transactions, resulting in lost revenue and
additional fees.
Increased Transaction Costs: Merchants may need to invest in enhanced
security measures and fraud detection systems, increasing operational costs.
Description: Consumer hesitance to make online purchases can increase following high-
profile attacks or data breaches.
Impact:
Decreased Sales: A drop in consumer confidence can result in lower sales
volumes, impacting overall business performance.
Long-Term Trends: If consumers develop a lasting fear of online shopping,
businesses may struggle to recover even after security improvements are made.
Increased Customer Education: Businesses may need to invest in educating
customers about security measures and practices to regain trust.
i. Risk Assessment
i. Anti-Virus Software
ii. Firewalls
Description: Firewalls act as a barrier between trusted internal networks and untrusted
external networks.
Types:
Hardware Firewalls: Physical devices that filter traffic entering and leaving a
network.
Software Firewalls: Applications installed on individual devices to monitor and
control incoming and outgoing traffic.
Benefits:
Blocks unauthorized access to networks and systems.
Monitors traffic for suspicious activity.
Description: IDPS monitor network traffic for suspicious activity and can take action to
prevent intrusions.
Benefits:
Identifies and alerts on potential threats in real-time.
Can automatically block malicious traffic based on defined rules.
Description: Keeping software and systems up to date with the latest security patches.
Benefits:
Addresses known vulnerabilities that could be exploited by attackers.
Reduces the risk of malware infections and breaches.
Description: Encrypting sensitive data both at rest and in transit to protect it from
unauthorized access.
Benefits:
Ensures that even if data is intercepted or accessed, it remains unreadable without
the decryption key.
Protects sensitive information, such as credit card details and personal data.
c. Several counter measures that may help e.g., virus scan software with full weekly
scan and frequent updates
i. Anti-Virus Software
ii. Firewalls
Description: Implement both hardware and software firewalls to monitor incoming and
outgoing network traffic.
Countermeasures:
Configuration Management: Regularly review and update firewall rules to
block unauthorized access.
Logging and Monitoring: Enable logging to track suspicious activities and
analyze traffic patterns.
Description: Keep all software and operating systems updated to patch vulnerabilities.
Countermeasures:
Automated Updates: Enable automatic updates for critical software to ensure
timely patching.
Regular Review: Conduct periodic reviews of installed software to identify any
that require updates.
vii. Data Encryption
Description: Encrypt sensitive data at rest and in transit to protect it from unauthorized
access.
Countermeasures:
Full Disk Encryption: Implement full disk encryption on all devices to safeguard
data.
Secure Transmission Protocols: Use protocols like HTTPS, TLS, and VPNs for
secure data transmission.
Description: Establish a robust backup strategy to protect data from loss or corruption.
Countermeasures:
Regular Backups: Schedule automated backups daily or weekly, depending on
data criticality.
Offsite Storage: Store backups in a secure offsite location or cloud service to
protect against physical disasters.
x. Network Segmentation
Description: Divide the network into segments to limit access and contain breaches.
Countermeasures:
Access Control Policies: Implement strict access control policies to limit user
access to specific segments.
Monitoring Traffic Between Segments: Monitor traffic between segments to
detect unusual behavior.
i. Real-Time Protection:
Description: Anti-virus software provides real-time scanning of files and
applications as they are accessed or downloaded.
Benefit: Immediate detection and response to potential threats, minimizing the
risk of infection.
ii. Scheduled Scans:
Description: Set automatic scans to run at regular intervals (e.g., daily,
weekly).
Benefit: Ensures that the entire system is regularly checked for malware, even
if users forget to run manual scans.
iii. Frequent Definition Updates:
Description: The software automatically downloads updates for virus
definitions and threat databases.
Benefit: Protects against the latest known threats, enhancing overall security.
iv. Software Patching:
Description: Automatic updates can also include patches for the anti-virus
software itself.
Benefit: Fixes vulnerabilities in the software that could be exploited by
attackers.
v. User Notifications:
Description: Users are notified when updates are installed or when scans are
completed.
Benefit: Keeps users informed about the security status of their systems.
Enable Automatic Updates: Always enable the automatic update feature in your
anti-virus software to ensure you receive the latest protections without delay.
Configure Scheduled Scans: Set up scheduled scans during off-peak hours to
minimize disruption while ensuring regular system checks.
Monitor Update Logs: Regularly review update logs to ensure that updates are
being applied successfully and to identify any issues.
Combine with Other Security Measures: Use automatic virus scan updates in
conjunction with firewalls, intrusion detection systems, and user training for
comprehensive protection.
Centralized Management:
Description: SUS provides a single point of control for managing updates
across multiple devices and systems.
Benefit: Simplifies the administration of software updates, reducing the
workload on IT staff.
Automated Deployment:
Description: Automatically downloads and deploys updates to client
machines.
Benefit: Ensures that all systems receive critical updates without the need for
manual intervention.
Customization of Update Policies:
Description: Administrators can configure policies to control when and how
updates are applied.
Benefit: Allows for flexibility in scheduling updates to minimize disruptions
to users.
Reporting and Monitoring:
Description: Provides tools for monitoring the status of updates and
generating reports on compliance.
Benefit: Helps IT teams track which systems are updated and identify any
issues or failures.
Support for Multiple Platforms:
Description: Many SUS solutions support various operating systems and
applications.
Benefit: Facilitates the management of diverse environments within an
organization.
i. Regular Maintenance: Keep the SUS server itself updated and maintained to
ensure optimal performance and security.
ii. Test Updates Before Deployment: Implement a testing phase for updates on a
small group of systems before a full rollout to catch potential issues.
iii. User Communication: Inform users of scheduled updates and any expected
downtime to manage expectations.
iv. Backup Systems: Regularly back-up systems before applying updates to ensure
quick recovery in case of update failures.
v. Monitor and Review: Continuously monitor update logs and system performance
post-deployment to identify and address any issues promptly.
Overview
Allowing only approved software to run on computer systems and removing unnecessary
authorizations from user accounts are critical measures in enhancing security and
preventing unauthorized software installations. This approach helps mitigate risks
associated with malware, unapproved applications, and potential data breaches.
Key Strategies
Software Restriction Policies (SRP)
Description: Implement SRPs to define what software can run on systems based
on various criteria, such as file path, hash, or digital signature.
Benefits:
Prevents unauthorized applications from executing.
Reduces the risk of malware infections.
Ensures compliance with organizational software standards.
Application Whitelisting
Description: Create a list of approved applications (whitelist) that are allowed to
run on devices.
Benefits:
Only verified software is permitted, enhancing security.
Simplifies the management of software installations and updates.
User Account Control (UAC)
Description: Configure UAC settings to limit user permissions, preventing
standard users from installing software.
Benefits:
Reduces the risk of unapproved software being installed inadvertently.
Allows only administrators to make system-wide changes.
Role-Based Access Control (RBAC)
Description: Implement RBAC to assign permissions based on user roles within
the organization.
Benefits:
Ensures that only authorized personnel can install or modify software.
Provides a clear structure for managing user permissions.
Group Policy Management
Description: Use Windows Group Policy to enforce software restrictions across
all systems in a network.
Benefits:
Centralized management of software policies.
Easy implementation of changes across all devices.
Regular Audits and Reviews
Description: Conduct regular audits to review installed software and user
permissions.
Benefits:
Identifies unauthorized software and users with excessive permissions.
Ensures compliance with organizational policies.
User Education and Training
Description: Provide training for users on the importance of software restrictions
and security best practices.
Benefits:
Raises awareness of security risks associated with unauthorized software.
Encourages adherence to organizational policies.
Implementation Steps
i. Define Approved Software: Collaborate with IT and relevant departments to create a list
of approved applications based on business needs.
ii. Configure Software Restriction Policies: Set up SRPs or application whitelisting using
group policy or dedicated software management tools.
iii. Limit User Permissions: Review user accounts and remove administrative privileges
from users who do not require them for their roles.
iv. Communicate Changes: Inform users about the new policies and the rationale behind
restricting software installations.
v. Monitor Compliance: Use monitoring tools to ensure compliance with software
restrictions and address any violations promptly.
vi. Regularly Update Policies: Review and update the list of approved software and policies
as needed to adapt to changing business requirements and threats.
Overview
Implementation Steps
Best Practices
Integrate with Other Security Tools: Combine vulnerability scanning with intrusion
detection systems (IDS) and firewalls for a comprehensive security strategy.
Maintain an Asset Inventory: Keep an updated inventory of all assets to ensure
complete coverage during scans.
Conduct Penetration Testing: Consider supplemental penetration testing to validate
findings from vulnerability scans and identify additional weaknesses.
Train Staff: Educate IT staff on interpreting scan results and implementing remediation
strategies effectively.
h. Common myths about malware
Overview
Firewalls and boundary devices are critical components of network security. They serve
as protective barriers between internal networks and external threats, controlling the flow
of traffic and ensuring that only authorized communications occur.
Firewalls
Definition
A firewall is a network security device that monitors and controls incoming and outgoing
network traffic based on predetermined security rules.
Types of Firewalls
1. Packet-Filtering Firewalls:
Function: Inspects packets of data and allows or blocks them based on
source/destination IP addresses, protocols, and ports.
Use Case: Basic filtering of traffic without deep inspection.
2. Stateful Inspection Firewalls:
Function: Monitors the state of active connections and makes decisions based on
the context of the traffic.
Use Case: Provides greater security than packet-filtering by keeping track of the
state of connections.
3. Proxy Firewalls:
Function: Acts as an intermediary between the user and the internet, filtering
requests and responses.
Use Case: Offers additional security by hiding the internal network from external
users.
4. Next-Generation Firewalls (NGFW):
Function: Combines traditional firewall features with advanced capabilities, such
as intrusion prevention, deep packet inspection, and application awareness.
Use Case: Provides comprehensive security for modern threats.
Key Features
Boundary Devices
Definition
Boundary devices are security appliances that serve as the first line of defense at the
perimeter of a network, controlling and securing the entry and exit points.
Types of Boundary Devices
Threat Prevention: Protects against unauthorized access and various cyber threats,
including malware and intrusions.
Policy Enforcement: Ensures compliance with organizational security policies by
controlling traffic based on established rules.
Network Segmentation: Helps segment networks to limit the spread of potential attacks.
Remote Access Security: Safeguards remote connections, ensuring secure access for
remote workers.
Best Practices
Regularly Update Rules and Policies: Continuously review and update firewall rules
and device configurations to adapt to evolving threats.
Monitor Logs: Regularly analyze logs for unusual patterns that could indicate security
issues.
Conduct Penetration Testing: Test the effectiveness of firewalls and boundary devices
by simulating attacks.
Implement Layered Security: Use multiple security devices and strategies to create a
defense-in-depth approach.
Detection Methods
Signature-Based Detection
Description: Compares incoming data against a database of known
attack signatures.
Advantage: Highly effective for known threats.
Limitation: Ineffective against new, unknown attacks (zero-day
vulnerabilities).
Anomaly-Based Detection
Description: Establishes a baseline of normal behavior and flags
deviations from this norm.
Advantage: Can detect previously unknown threats.
Limitation: May produce false positives due to benign anomalies.
k. Network security
Overview
Network security encompasses measures and protocols designed to protect the integrity,
confidentiality, and availability of computer networks and data. It involves a combination
of hardware, software, policies, and procedures to safeguard networks from unauthorized
access, misuse, and attacks.
i. Firewalls
Function: Act as barriers between trusted internal networks and
untrusted external networks.
Types: Packet-filtering, stateful inspection, proxy, and next-generation
firewalls.
ii. Intrusion Detection and Prevention Systems (IDPS)
Intrusion Detection System (IDS): Monitors network traffic for
suspicious activity and alerts administrators.
Intrusion Prevention System (IPS): Monitors and actively blocks
potential threats based on predefined rules.
iii. Virtual Private Networks (VPN)
Function: Encrypts internet connections to secure data transmission,
especially for remote users.
Use Case: Provides secure access to private networks over public
networks.
iv. Antivirus and Anti-malware Solutions
Function: Detects, prevents, and removes malicious software from
networks and devices.
Importance: Essential for protecting endpoints and servers from
malware infections.
v. Access Control
Definition: Mechanisms that restrict access to network resources based
on user roles and permissions.
Types: Role-Based Access Control (RBAC), Mandatory Access Control
(MAC), and Discretionary Access Control (DAC).
vi. Network Segmentation
Function: Divides a network into smaller, isolated segments to limit the
spread of attacks and enhance performance.
Benefits: Improved security and better control over network traffic.
vii. Data Loss Prevention (DLP)
Function: Monitors and controls data transfer to prevent unauthorized
access and data breaches.
Use Case: Protects sensitive information from being leaked or
mishandled.
viii. Encryption
Function: Protects data by converting it into a coded format that can only
be read by authorized users.
Importance: Ensures data confidentiality during transmission and
storage.
Spam Emails
Comparison Summary
Moderate
High (immediate
Urgency Low (informative) (often plays on
action required)
emotions)
Impersonates Unknown or
Unknown or
Sender legitimate fabricated
dubious senders
organizations identities
Can be
Links Often malicious Typically legitimate malicious or
harmless
High
Content Variable, often low Often poorly
(craftsmanship to
Quality quality written
deceive)
Deceptive Phishing
Malware-Based Phishing
Session Hijacking
Web Trojans
Description: Involves altering the local hosts file to redirect users from
legitimate websites to malicious ones.
Method: Attackers modify the hosts file on a user's device, changing the IP
address of trusted sites to point to malicious servers.
Example: A user tries to visit their bank's website but is redirected to a fake
site that looks identical, where they unknowingly enter their login credentials.
Data Theft
Content Injection
Comparison Summary
Targeted Broadcast
Attacks Attacks
Aspect
(Spear (Bulk
Phishing) Phishing)
Large
Specific
groups of
Audience individuals
individual
or roles
s
High Low
Personalizati
(customized (generic
on
messages) messages)
Minimal,
Detailed
often
Information knowledge
unrelated
Used about the
informatio
target
n
Prize
CEO
scams,
impersonatio
Examples generic
n, tailored
service
messages
alerts
4. How to make password security strong and factors that make it weak
Solutions:
Short Passwords
Passwords that are too brief (e.g., fewer than 8 characters) are easier
to crack using brute-force attacks.
Predictable Patterns
Using sequences (e.g., "123456") or keyboard patterns (e.g.,
"qwerty") makes passwords easily guessable.
Failure to Update Passwords
Not changing passwords regularly allows attackers more time to
exploit them if they are compromised.
c. Same character types
Recommended Practices
i. Secure Storage
Description: Password management tools, such as password
vaults, store all your passwords securely in an encrypted format.
Benefit: Reduces the risk of password theft by keeping
passwords out of plain sight and inaccessible to unauthorized
users.
ii. Simplified Access
Description: Users can store site addresses, login IDs, and
passwords all in one place.
Benefit: No need to remember multiple passwords; just
remember one master password.
iii. Strong Password Generation
Description: Many password managers can generate complex,
random passwords.
Benefit: Encourages the use of unique passwords for each site,
enhancing security.
iv. Automatic Form Filling
Description: Password managers can autofill login forms on
websites.
Benefit: Saves time and reduces the likelihood of entering
incorrect credentials.
v. Cross-Device Synchronization
Description: Most password managers offer synchronization
across devices (e.g., computers, smartphones, tablets).
Benefit: Access your passwords from anywhere, ensuring
convenience without compromising security.
Master Password
Importance: The master password is the key to accessing the
password vault. It should be strong, memorable, and unique.
Tips for Creating a Strong Master Password:
Use a long passphrase combining random words and special
characters (e.g., "Bunny!Dance@2025").
Avoid using easily guessable information, like names or
birthdays.
Consider using a mnemonic to help remember it.
REFERNCES
Books
Bosworth, S., Kabay, M. E. and Whyne, E., eds. 2009. Computer Security Handbook. 5th
ed. Hoboken: John Wiley & Sons.
Engebretson, P., 2011. The Basics of Hacking and Penetration Testing: Ethical Hacking
and Penetration Testing Made Easy. Waltham: Syngress.
Gollmann, D., 2011. Computer Security. 3rd ed. Chichester: John Wiley & Sons.
Lehtinen, R., Russell, D. and Gangemi, G. T. 2006. Computer Security Basics. 2nd ed.
Sebastepol: O’Reilly. McClure, S., Scambray, J. and Kurtz, G., 2012. Hacking Exposed:
Network Security Secrets & Solutions. 7th ed. New YorkDifferent motivations of authors
of malware
REFERNCES
Books
Bosworth, S., Kabay, M. E. and Whyne, E., eds. 2009. Computer Security Handbook. 5th
ed. Hoboken: John Wiley & Sons.
Engebretson, P., 2011. The Basics of Hacking and Penetration Testing: Ethical Hacking
and Penetration Testing Made Easy. Waltham: Syngress.
Gollmann, D., 2011. Computer Security. 3rd ed. Chichester: John Wiley & Sons.
Lehtinen, R., Russell, D. and Gangemi, G. T. 2006. Computer Security Basics. 2nd ed.
Sebastepol: O’Reilly.
McClure, S., Scambray, J. and Kurtz, G., 2012. Hacking Exposed: Network Security
Secrets & Solutions. 7th ed. New York
; London: McGraw-Hill.
Journals
Computing, Springer. [online] Available at: <www.springer.com/computer/journal/607>
[Accessed 4 December 2012].
Journal of Computing, Journal of Computing. [online] Available at:
<www.journalofcomputing.org/> [Accessed 4 December 2012].
Websites
About.com: JavaScript, n.d. Password Generator. About.com: JavaScript. [online]
Available at: <http://javascript.about.com/library/blpasswd.htm> [Accessed 4 December
2012].
Blackwell, G. 2005. When Hackers Attack. ECommerce-Guide. [online] Available at:
<www.ecommerce guide.com/solutions/building/article.php/3484666/When-Hackers-
Attack.htm> [Accessed 4 December 2012].
HellBound Bloggers, n.d. 8 Symptoms of Computer Virus [Security]. HellBound
Bloggers. [online] Available at: <http://hellboundbloggers.com/2010/12/13/symptoms-
of-computer-virus/> [Accessed 12 December 2012].
Indiana University, n.d. Information Security & Policy: Phishing. Indiana University.
[online} Available at: <http://protect.iu.edu/cybersecurity/safeonline/phishing>
[Accessed 4 November 2012].
Landesman, M., 2008. What are Social Engineering Attacks? About.com: Antivirus
Software. [online] Available at: <http://antivirus.about.com/b/2008/10/10/what-are-
social-engineering-attacks.htm> [Accessed 4 December 2012].
US_CERT, updated 2008. Recognising and Avoiding Email Scams. US_CERT. [online]
Available at: <www.us cert.gov/reading_room/emailscams_0905.pdf> [Accessed 4
December 2012].
Other
Waldron, H., 2012. Avira Security – Symptoms of Malware Infection. MSMVPs.
[online] Available at: <http://msmvps.com/blogs/harrywaldron/archive/2012/11/19/avira-
security-symptoms-of-malwareinfection.aspx> [Accessed 11 December 2012].
Shimonski, R. J., updated 2004. Denial of Service 101. WindowSecurity.com. [online]
Available at: <www.windowsecurity.com/articles/Denial_of_Service_101.html>
[Accessed 4 December 2012].
Shimonski, R. J., updated 2004. What You Need to Know About Intrusion Detection
Systems. WindowSecurity.com. [online] Available at:
<www.windowsecurity.com/articles/what_you_need_to_know_about_intrusion_detectio
n_systems.html [Accessed 4 December 2012].
Todd, B., 2000. Distributed Denial of Service Attacks. Linux Security. [online] Available
at: <www.linuxsecurity.com/resource_files/intrusion_detection/ddos-whitepaper.html>
[Accessed 4 December 2012].