What Is System Attacks ? Types OF System Based Attacks
Type OF System Based Attacks -
1. Virus
It is a type of malicious software program that spread throughout the computer files without the knowledge of a user. It is a self-replicating malicious computer program that replicates by inserting copies of itself into other computer programs when executed. It can also execute instructions that cause harm to the system.
Type OF Virus
RESIDENT VIRUS : Resident viruses set up shop in your RAM and meddle with your system operations. They’re so sneaky that they can even attach themselves to your anti-virus software files.
MULTIPARTITE VIRUS : This virus infects the entire system. Multipartite viruses spread by performing unauthorized actions on your operating system, folders, and programs.
DIRECT ACTION : This virus targets a specific file type, most commonly executable files (.exe), by replicating and infecting files. Due to its targeted nature, this virus type is one of the easier ones to detect and remove.
BROSWER HIJACKER : Easily detected, this virus type infects your browser and redirects you to malicious websites.
OVERWRITE VIRUS : Like the name implies, overwrite viruses overwrite file content to infect entire folders, files, and programs.
WEB SCRIPTING VIRUS : This sneaky virus disguises itself in the coding of links, ads, images, videos, and site code. It can infect systems when users download malicious files or visit malicious websites.
FILE INFECTOR : By targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.
NETWORK VIRUS : Network viruses travel through network connections and replicate themselves through shared resources.
BOOT SECTOR VIRUS : One of the easier viruses to avoid, this virus hides out in a file on a USB drive or email attachment. When activated, it can infect the system’s master boot record to damage the system.
2. Worm
It is a type of malware whose primary function is to replicate itself to spread to uninfected computers. It works same as the computer virus. Worms often originate from email attachments that appear to be from trusted senders.
3. Trojan horse
It is a malicious program that occurs unexpected changes to computer setting and unusual activity, even when the computer should be idle. It misleads the user of its true intent. It appears to be a normal application but when opened/executed some malicious code will run in the background.
4. Backdoors
It is a method that bypasses the normal authentication process. A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes.
5. Bots
A bot (short for "robot") is an automated process that interacts with other network services. Some bots program run automatically, while others only execute commands when they receive specific input. Common examples of bots program are the crawler, chatroom bots, and malicious bots.
Comments
Post a Comment