Types Of Attacks On Computer System - Cheered By Me



Wednesday, August 1, 2018

Types Of Attacks On Computer System

In today's information technology oriented world, it is very important to protect your computer from malicious activities and attacks. These days security has become a major concern for computers connected to the internet. A computer encounters security risks from various sources, such as remote hackers, virus hackers, etc. from the internet.
Source of images: google
An attack is defined as an effort to gain access, modify, damage or steal the information from the computer. It is important for a user to understand each type of attack to be able to identify it. Let us understand some attacks described below.

Identity Theft or hacking

Identity theft or hacking occurs in the attacker breaks into the computer through the internet by tricking the computer's security mechanism and extracts confidential information from the computer. This type of attacker can access all the personal details such as user name, password of a person from his computer.

An example of this type of attack is when an attacker is able to illegally access the bank details and obtain the password of the users. This attacker can then illegally transfer money from the users account to his own account.

Malicious Code Attacks

Malicious code enter a computer system through e-mails, web content, Internet file downloads and removable media such as flash drives or zip drives. These are a type of malware such as computer virus, Trojan horses, etc. Malicious code can seriously harm the computer's hardware and software.

Virus, Worms and Trojans

These are a type of malicious code attacks. A virus is a software program code that can harm computer hardware, operating system or application software. A virus generally arrives in the system through e-mails.

Once a virus is inadvertently activated, it begins damaging activities such as deleting files, corrupting and destroying applications, disabling devices on a computer or reformatting hard disk.

A worm virus is also a computer virus that can self-replicate, mostly without human intervention. Other kinds of viruses rely more on curiosity or user naivete to spread.

The famous examples of worm viruses are ILOVEYOU, Michelangelo, and MSBlast. This worm can come to the system via email with the subject line and an attachment. The moment you will open the email and click the attachment, this worm will download itself on the computer and start a series of harmful activities, such as deleting files with the extensions .COM, .EXE and .INI.

Trojan Horse is arrives in a computer system or network through software downloads, e-mail attachments, websites containing executable content, media player and chat applications. It presents itself as a useful program to the user but performs damaging activities once executed.

Email Hacking

In this type of attack, the hacker tries to access an email account illegally. By providing a strong password, this type of attacks can be warded off.

Phishing and Online Fraud

Phishing is a trap laid for the user through the emails. Here, the user gets an email that guides the user to a website. This website tricks the user into providing personal information such as user ID, password, debit card number, PIN, etc. These websites shows themselves to be legitimate organization. But in reality, they are fake. There purpose is to stealing the users personal information and is misused in a variety of ways.

How to protect your privacy by using Antivirus Software

As the computer is vulnerable to so many different types of harmful attacks from the internet, it is important to arm it with some software that can protect it from them. Such a software that shields the computer from the harmful influences coming through the internet is called an Antivirus software.

Antivirus Software serves the following purposes:

  • Protects the computer from harmful attacks happening via the internet.
  • Detects any attack if it is made in the computer via internet.
  • Informs the user about such an attack.
  • Takes action to help the computer get rid of such malicious software programs that have entered through the internet.

Steps to use Antivirus Software

Following steps can be used to install and use antivirus software on a computer:

  • Install the Antivirus on computer.
  • Run scan and remove any virus, if present.
  • Schedule scan to run automatically every week.
  • Also schedule the scan to run and check whenever a download happens from the internet

Email and Password Security

Antivirus Software cannot prevent a person's email from being hacked. This can be done by providing a strong password for one's email account. If certain guidelines are observed regarding email password, a person can create strong passwords that would protect his/her email from being hacked.

Guidelines for setting strong passwords are as follows:

  • Passwords should be long, easy to remember and complex.
  • They should be different from the username.
  • Passwords should be changed every two months.

A strong password contains each of the following:

  • Alphabets Both Upper and Lower Case (A,a)
  • Numbers (1,2,3)
  • Special Characters (@, &, ?)
It is important to note that passwords should not be written anywhere.

No comments:

Post a Comment