1 / 0

Malicious Attacks

Malicious Attacks. Angela Ku Adeline Li Jiyoung You Selena Yuen. Intro/Background. Malicious Attacks – electronic attacks in which an attacker attempts to access, steal, or destroy a user’s data without his or her permission. Trojan. A type of virus that hides within a set of programs

sunee
Télécharger la présentation

Malicious Attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Malicious Attacks

    Angela Ku Adeline Li Jiyoung You Selena Yuen
  2. Intro/Background Malicious Attacks – electronic attacks in which an attacker attempts to access, steal, or destroy a user’s data without his or her permission
  3. Trojan A type of virus that hides within a set of programs Stealing information from a user’s computer and sends it to designated Internet servers Most commonly spread through email attachments
  4. Worms A software program that has the ability replicate itself without a host program Spreads itself through network connections
  5. Logic Bomb A virus inserted into a software system that launches an attack after certain conditions are met Most viruses attack host systems on specific days, such as April Fool’s Day or Friday the 13th
  6. Phishing A process in which attackers seek to obtain personal information (such as passwords or credit card details)through the use of fake websites Often carried out by email or instant messaging
  7. Preventing Against Malicious Attacks Use strong passwords Firewall Install updated anti-virus software Use multiple virus scanners Remove unused communication ports Do not open email from unknown sources
More Related