0% found this document useful (0 votes)
4 views10 pages

Ecommerce Threats

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views10 pages

Ecommerce Threats

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Threats

Virus
• A virus is a computer program that has the ability to replicate or make
copies of itself, and spread to other files.
• Computer viruses generally require a host program.
• The virus writes its own code into the host program.
• Computer viruses cause billions of dollars' worth of economic damage
each year.
• The three main virus parts are:
• Infection mechanism
• Trigger
• Payload
• Viruses are often combined with a worm.
Worm
• a worm is designed to spread from computer to computer, Instead of just
spreading from file to file.
• A worm does not necessarily need to be activated by a user or program in
order for it to replicate itself.
• The Slammer worm is one of the most notorious. Slammer targeted a known
vulnerability in Microsoft’s SQL Server database software and infected more
than 90% of vulnerable computers worldwide within 10 minutes of its release
on the Internet; crashed Bank of America cash machines, especially in the
southwestern part of the United States; affected cash registers at
supermarkets such as the Publix chain in Atlanta, where staff could not
dispense cash to frustrated buyers; and took down most Internet connections
in South Korea, causing a dip in the stock market there.
• The Conficker worm, which first appeared in November 2008, is the most
significant worm since Slammer, and reportedly infected 11 million computers
worldwide (Microsoft, 2015).
Ransomware
• Ransomware (scareware) is a type of malware (often a worm) that locks
the computer or files to stop from accessing them.
• Ransomware will often display a notice that says an authority such as the
FBI, Department of Justice, or IRS has detected illegal activity on the
computer and demands that a payment of a fine be paid in order to
unlock the computer and avoid prosecution.
• One type of ransomware is named CryptoLocker.
• CryptoLocker encrypts victims’ files with a virtually unbreakable
asymmetric encryption and demands a ransom to decrypt them, often in
Bitcoins.
• If the victim does not comply within the time allowed, the files will not
ever be able to be decrypted.
• Ransomware attacks increased by over 400% in 2016, and the U.S.
Department of Justice reports that there are over 4,000 ransomware
attacks daily, up from 1,000 daily in 2015.
Trojan Horse
• A Trojan horse appears to be benign, but then does something other than
expected.
• The Trojan horse is not itself a virus because it does not replicate, but is
often a way for viruses or other malicious code such as bots or rootkits (a
program whose aim is to subvert control of the computer’s operating
system) to be introduced into a computer system.
• a Trojan horse may masquerade as a game, but actually hide a program to
steal your passwords and e-mail them to another person.
• According to Panda Security, Trojans accounted for over 50% of all
malware created in 2015, and over 60% of all malware infections (Panda
Security, 2016).
Bots
• Bots (short for robots) are a type of malicious code that can be covertly
installed on the computer when attached to the Internet.
• Once installed, the bot responds to external commands sent by the
attacker.
• The computer becomes a “zombie” and is able to be controlled by an
external third party (the “bot-herder”).
Adware
• Adware is typically used to call for pop-up ads to display when
the user visits certain sites.
• While annoying, adware is not typically used for criminal
activities.
• Adware, often called advertising-supported software by its
developers, is software that generates revenue for its
developer by automatically generating online
advertisements in the user interface of the software or on a
screen presented to the user during the installation process.
• Examples are: Fireball, DollarRevenue etc.
Phishing
• Phishing is any deceptive, online attempt by a third party to obtain
confidential information for financial gain.
• Phishing attacks typically do not involve malicious code but instead rely on
straightforward misrepresentation and fraud, so-called “social
engineering” techniques.
• One of the most popular phishing attacks is the e-mail scam letter. The
scam begins with an e-mail: “a rich former oil minister of Nigeria is seeking
a bank account to stash millions of dollars for a short period of
time…………”……. This type of e-mail scam is popularly known as a
“Nigerian letter” scam.
• On any given day, millions of these phishing attack e-mails are sent, and,
unfortunately, some people are fooled and disclose their personal account
information.
Spoofing
• Spoofing involves attempting to hide a true identity by using someone
else’s e-mail or IP address.
• For instance, a spoofed e-mail will have a forged sender e-mail address
designed to mislead the receiver about who sent the e-mail.
• IP spoofing involves the creation of TCP/IP packets that use someone
else’s source IP address, indicating that the packets are coming from a
trusted host.
• Most current routers and firewalls can offer protection against IP spoofing.
DOS attacks
• In a Denial of Service (DoS) attack, hackers flood a website with useless
pings or page requests that inundate and overwhelm the site’s web
servers.
• Increasingly, DoS attacks involve the use of bot networks and so-called
“distributed attacks” built from thousands of compromised client
computers.
• DoS attacks typically cause a website to shut down, making it impossible
for users to access the site.
• Although such attacks do not destroy information or access restricted
areas of the server, they can destroy a firm’s online business.

You might also like