Assignment 2 Sita
Assignment 2 Sita
Assignment 2 Sita
Computer contamination / Virus attack : A computer virus is a computer program that can infect other
computer programs by modifying them in such a way as to include a (possibly evolved) copy of it.
Viruses can be file infecting or affecting boot sector of the computer. Worms, unlike viruses do not need
the host to attach themselves to.
Email Bombing : Sending large numbers of mails to the individual or company or mail servers thereby
ultimately resulting into crashing.
Salami Attack : When negligible amounts are removed & accumulated in to something larger. These
attacks are used for the commission of financial crimes.
Logic Bomb : Its an event dependent programme , as soon as the designated event occurs, it crashes the
computer, release a virus or any other harmful possibilities.
Trojan Horse : an unauthorized program which functions from inside what seems to be an authorized
program, thereby concealing what it is actually doing.
Data diddling : This kind of an attack involves altering raw data just before it is processed by a computer
and then changing it back after the processing is completed.
Against Society
Forgery : currency notes, revenue stamps, mark sheets etc can be forged using computers and high quality
scanners and printers.
Cyber Terrorism : Use of computer resources to intimidate or coerce others.
Web Jacking : Hackers gain access and control over the website of another, even they change the content
of website for fulfilling political objective or for money available such at e- mail, chat rooms, user net
groups.