- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
What are the Threats and Attacks to Information Security?
Attacks can be defined by the relationship between threat, vulnerability, and damage. It can prevent attacks from viruses and worms, a current version of antivirus software must be used. Security threats associated with computer crime or abuse such as −
Computer Viruses − The computer virus defines specifically as malware adding malicious programs into existing reports or programs. It circulates itself by several means. Viruses are treated as the general type of network security threat. Almost 90% of viruses are circulating through a connection on e-mails. However, a cautious user action can avoid the circulate of virus because virus needed a user action to add itself into a computer.
Trojan Horses − This malware attack misrepresent itself as something virtuous like a computer game or a search results page. Once installed on a computer, the Trojan horse can download and install a keylogger onto the infected computer to data each keystroke by a computer’s user, therefore stealing vital elements of the users. They generally hide in a downloadable free application on a website.
The users must hate themselves for downloading freeware. It is observed that organizations block free download applications to avoid the attack of Trojan horses.
Spam − Spam constitutes 70% to 84% of daily emails sent throughout the globe that demands an ever-increasing requirement for IT resources to filter out this irritating and probably malicious menace. Spam email includes unsolicited emails promoting products and coordinated spam attacks to employ so much bandwidth on a network to create it to crash.
Spam can use techniques “news service” spam, which needs legitimate news headlines to deceive recipients into opening spam emails. Best email filters are used to filter the spam and what slips through can be prevented by staying away not to fraud with the emails. There should be analysis for the signing of some online service or freebie.
Phishing − Emails with titles including, “URGENT: Update Account Status” are some attempts by a spammer to “phish” the account analysis. Phishing defines spam emails to trick recipients into pressing on a link to an insecure website and support details treating the website as a genuine one.
Generally, phishing tries are carried out to steal account data for e-commerce sites including banks, eBay, or regular financial institutions’ websites. A phishing email tricks the user to press a link, which will create the user to a page where the user is quoted to re-enter some account details such as credit card number(s) and passwords. These websites are not a real sites, even though they review like it.
- Related Articles
- What are the Network Security threats and attacks?
- What are network based attacks and network security threats?
- What are the Physical Threats in Information Security?
- What are the Password Attacks in Information Security?
- What are the classification of security attacks in information security?
- What are Unknown Attacks in information security?
- What are the classifications of threats in information security?
- What are the attacks on DES in Information Security?
- What are the types of attacks on Biometric devices in information security?
- What are the types of Cryptanalysis Attacks on AES in information security?
- What are security threats? Differentiate between wired and wireless threats
- What are Blended Threats? How Do Blended Attacks Work?
- What are the different types of Cyber Security Threats?
- What are the security services of Information Security?
- What are the Information Security Attack?
