Vous êtes sur la page 1sur 13

Types of Threats in Networks

Submitted by Given by
AMISHA ARORA Dr MEENAKSHI SRIVASTAVA
RAMANDEEP KAUR
TYPES OF THREATS
There are Ten Common Threats
 Computer Virus
 Trojan Horses
 Phishing
 Spoofing
 Spyware
 DOS attack
 Malware
 Rootkit
 Man-in-the-middle attack
 keylogger
COMPUTER VIRUS
 A computer virus is a type of malicious software that, when
executed, replicates itself by modifying other computer
programs and inserting its own code.
 Viruses are known to send spam, disable your security
settings, corrupt and steal data from your computer, even going
as far as to delete everything on your hard drive.
 Solution: Install a security program that protects the computer
against threats.
 Types of viruses:- Boot sector virus, macro virus, multipartite
virus
TROJAN HORSE
 Trojan, is any malicious computer program which
misleads users of its true intent.
 Trojans are generally spread by some form of social
engineering, for example where a user is duped into
executing an e-mail attachment disguised to appear not
suspicious or by clicking on some fake advertisement on
social media or anywhere else.
 Ransomware attacks are often carried out using a
Trojan.
PHISHING
 Phishing is “ an e-mail fraud method in which the
perpetrator sends out legitimate-looking emails in an attempt
to gather personal and financial information from recipients.
 In my opinion phishing is one of the worst security threats
over a network because a lot of people that use computers
linked up to a network are amateurs and would be very
vulnerable to giving out information that could cause
situations such as theft of money or identify theft.
 Solution: Phishing can be prevent by using Phishing filters
to filter out this unwanted mail and to prevent threat.
SPOOFING
 Spoofing is the act of assuming the identity of some other
computer or program.
 Types of Network spoofing:
 IP Spoofing:- “In an IP address spoofing attack, an attacker sends IP
packets from a false source address in order to disguise itself.”
 ARP spoofing:- “ In an ARP spoofing attack, a malicious party
sends spoofed ARP messages across a local area network in order to
link the attacker’s MAC address with the IP address of a legitimate
member of the network.”
 DNS spoofing:- “ In a DNS server spoofing attack, a malicious party
modifies the DNS server in order to reroute a specific domain name to a
different IP address.”
SPYWARE
 Spyware is software that aims to gather information
about a person or organization, sometimes without
their knowledge, that may send such information to
another entity without the consumer's consent,
through cookies .
 "Spyware" is mostly classified into four types: adware,
system monitors, tracking cookies and trojans.
 Solution: It can be prevented using anti-spyware
software.
DOS ATTACK
 A denial-of-service (DoS) is any type of attack where the
attackers attempt to prevent legitimate users from
accessing the service or network.
 In the DoS, the attackers usually send several messages
asking the server to accepts requests from invalid return
addresses.
 Defensive responses to denial-of-service attacks typically
involve the use of a combination of attack detection,
traffic classification and response tools.
MALWARE
 Malware is any software intentionally designed to cause
damage to a computer, server, client, or computer
network.
 Malware does the damage after it is implanted or
introduced in some way into a target's computer and can
take the form of executable code, scripts, active content,
and other software.
 Solution: It can be prevented using anti-malware software.
ROOTKIT
 A rootkit is a collection of computer software,
typically malicious, designed to enable access to a computer or
an area of its software that is not otherwise allowed and often
masks its existence or the existence of other software.
 Rootkit installation can be automated, or an attacker can install
it after having obtained root or Administrator access.
 Manual removal of a rootkit is often too difficult for a typical
computer user, but a number of security-software vendors offer
tools to automatically detect and remove some rootkits,
typically as part of an antivirus suite.
MAN-IN-THE MIDDLE ATTACK
 Man-in-the-middle attacks are cyber security attacks that allow
the attacker to eavesdrop on communication between two
targets.
 It can listen to a communication which should, in normal
settings, be private.
 Here are just some of the types of MITM attacks:
 DNS spoofing.
 HTTPS spoofing.
 IP spoofing.
 ARP spoofing.
 SSL hijacking.
 Wi-Fi hacking.
KEYLOGGER
 Keylogging is the action of recording (logging) the keys
struck on a keyboard, typically covertly, so that person using
the keyboard is unaware that their actions are being monitored.
 The use of their computers, keyloggers are most often used for
the purpose of stealing passwords and other confidential
information.
 Solution: It can be prevented using anti-keylogger software.
 An anti-keylogger is a piece of software specifically designed
to detect keyloggers on a computer, typically comparing all
files in the computer against a database of keyloggers looking
for similarities which might signal the presence of a hidden
keylogger.
THAT’S ALL
THANK
YOU FOR WATCHING
MY PRESENTATION
I HOPE YOU
ENJOYED IT

Vous aimerez peut-être aussi