Internet and Networks Attacks
Internet and Networks Attacks
Internet and Networks Attacks
Unscrupulous programmers write malware and then test it to ensure it can deliver its payload. The payload is the destructive event or prank the program is intended to deliver.
MALWARE (MALICIOUS PROGRAM) Malware are programs that act without a users knowledge and deliberately alter the computers operations. Computer viruses, worms, and Trojan horses are classified as malware.
Computer Viruses is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the users knowledge or permission. Once the virus infects the computer, it can spread throughout and may damage files and system software, including the operating system.
A worm is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.
A Trojan horse (named after the Greek myth) is a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the Trojan horse. Unlike a virus or worm, a Trojan horse does not replicate itself to other computers.
TIPS FOR PREVENTING VIRUS, WORM, AND TROJAN HORSE INFECTIONS Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media is uninfected. Never open an e-mail attachment unless you are expecting it and it is from a trusted source. Turn off message preview. Install an antivirus program on all of your computers. Obtain updates to the virus signature files on a regular basis. Check all downloaded programs for viruses, worms, or Trojan horses. This malware often is placed in seemingly innocent programs, so it will affect a large number of users. If the antivirus program flags an e-mail attachment as infected, delete the attachment immediately. Before using any removable media, use the antivirus scan program to check the media for infection. Install a personal firewall program.
A computer infected by a virus, worm, or Trojan horse often has one or more of the following symptoms : Screen displays unusual message or image Music or unusual sound plays randomly Available memory is less than expected Existing programs and files disappear Files become corrupted Programs or files do not work properly Unknown programs or files mysteriously appear System properties change
SPAM Unwanted or junk e-mail. The spammers get your e-mail whenever you used your email address to purchase anything online or to open an online account, or if youve participated in a newsgroup or a chat room.
COOKIES Small text files that some Web sites automatically store on your computers hard drive when you visit the Web site. It assign unique ID number for your computer to make your return visit to the Web site more efficient to your interest because it can keeps tracks from its database.
Shelly C.V (2007). Discovering Computers. Boston : Thomson Course Technology. Alan Evans, Kendall Martin & Mary A.P (2008). Technology in Action. New Jersey : Pearson Prentice Hall.