1. Non Technical Attack
- Social Engineering or Phishing
2. Technical or Malicious Attack
- Denial-of-service (DoS) attack
It is an attack on a website in which an attacker uses specialized software to send a flood of data packet to the target computer with the aim of overloading its resources. Due to overloading, it caused the network shut down and make users cannot access to the site.
First, the attacker uses a fake IP address in each packet and sends it to a user (victim).
Then, the user cannot differentiate which is the request is fake and legal, so he or she will tries to respond every request that he or she receives.
After that, the replies will reached to a computer that does not exist which means the attacker obtained the user’s information successfully.
Virus
A piece of software code that need to inserts itself into a host program including the operation systems, to spread from one computer to another computer. It can destroy your computer hardware, software and personal information.
In order to prevent the virus spread, you are recommended to have a good anti virus installed in your computer before connected to Internet. In addition, the anti virus program need to be updated.
In order to prevent the virus spread, you are recommended to have a good anti virus installed in your computer before connected to Internet. In addition, the anti virus program need to be updated.
- Worm
Due to this reason, you are advised not to simply open any attachment from your email unless you are clearly known what the content of the attachment is. Even though you want to open the attachment, you can save it into a folder on your hard drive and scan it with your anti virus software before you open it.
- Trojan Horse
Users might lured by the Trojan horse that seems appeared as a gift, but it is actually brings harmfulness to your computer such as it allows the attacker to take control of your computer, steal your personal data such as credit card information and passwords, and even worst is caused your computer to stop functioning.
As a conclusion, we as a user of computer and internet, are responsible and be aware to protect our data to be kept safely besides depends on the online security.
references:
http://ia.metrostate.edu/sobis/document/mattord_social_engineering_v3.pdf
1 comments:
Technology advance, threat also advance... Who invent all these??
Post a Comment