More

Monday, 9 March 2015

Attacks types

Here we learn Type of attacks
Malware
Simply defined, malware is any computer code that has a malicious intent. Malware is often used to destroy something on a computer or to steal private information. Odds are, nearly everyone with a computer has fallen victim to some form of malware in their time.

Viruses

As the name implies, viruses make a computer "sick". They infect a computer, just like a real virus that infects a person, and then they hide inside the depths of the computer. Viruses replicate themselves, and they survive by attaching to other programs or files. Though viruses are one of the oldest types of cyber attacks, they can be some of the craftiest. The capability of viruses has evolved, and they are often hard to spot and remove from a computer ("Current Cyber").
Spyware

Spyware is a form of malware that monitors or spies on its victims. It usually remains in hiding, but even so, it can log the various activities performed by a user. Spyware is capable of recording keystrokes (what a user types on the keyboard), which means that the attacker can view passwords that the victim enters into the computer. Spyware is also used to steal confidential information (Konklin 418).
Worms

Similar to viruses, worms replicate themselves many times to fulfill a nefarious purpose. However, worms differ from viruses in that they do not need to attach themselves to other files or programs. Worms are capable of surviving all by themselves, and not only do they replicate on a single computer host, but they can also replicate across an entire network of computers ("Current Cyber"). It is these features that can make a worm significantly more dangerous than a virus.

Password Attacks

These attacks are focused on cracking a victim's password so that the attacker may obtain access to a secured system. A username/password combination is typically the standard form of authentication on most systems. Though this type of account security is not necessarily weak by default, a user must follow good password procedures in order to stand a chance against a password attack (Konklin 412).
Brute-Force Attack

This type of attack is typically used as an end-all method to crack a difficult password. A brute-force attack is executed when an attacker tries to use all possible combinations of letters, numbers, and symbols to enter a correct password. Programs exist that help a hacker achieve this, such as Zip Password Cracker Pro, as seen in Figure 2. Any password can be cracked using the brute-force method, but it can take a very long time to finish. The longer and more intricate a password is, the longer it will take a computer to try all of the possible combinations (Konklin 413).


Dictionary Attack

A dictionary attack takes place when an attacker utilizes a dictionary in an attempt to crack a password. Essentially, words from the dictionary are inputted into the password field to try to guess the password. Programs and tools exist that allow hackers to easily try various combinations of words in the dictionary against a user's password (Konklin 412). Because of the dictionary attack, it is recommended to use passwords that do not contain simple words that can be found in a dictionary.

Denial-of-Service Attacks

A denial-of-service (DoS) attack is a special form of cyber attack that focuses on the interruption of a network service. This is achieved when an attacker sends high volumes of traffic or data through the target network until the network becomes overloaded ("Denial-of-Service"). Think of a man juggling; he may be able to juggle quite well when using three or four balls, but if someone throws more balls into the fray and he tries to continue juggling with an increasing amount of balls, he may lose control and drop them all. This is essentially what happens when a network becomes overloaded

1 comment:

  1. Do you need to increase your credit score?
    Do you intend to upgrade your school grade?
    Do you want to hack your cheating spouse Email, whatsapp, Facebook, instagram or any social network?
    Do you need any information concerning any database.
    Do you need to retrieve deleted files?
    Do you need to clear your criminal records or DMV?
    Do you want to remove any site or link from any blog?
    you should contact this hacker, he is reliable and good at the hack jobs..
    contact : cybergoldenhacker at gmail dot com

    ReplyDelete