In: Computer Science
Threats of computer network users are:-
1).Computer virus :-
For everyday Internet users, computer viruses are one of the most common threats to cybersecurity. Statistics show that approximately 33% of household computers are affected with some type of malware, more than half of which are viruses.
Computer viruses are pieces of software that are designed to be spread from one computer to another. They’re often sent as email attachments or downloaded from specific websites with the intent to infect your computer — and other computers on your contact list — by using systems on your network. Viruses are known to send spam, disable your security settings, corrupt and steal data from your computer including personal information such as passwords, even going as far as to delete everything on your hard drive.
Prevention:-
1. Install an anti virus, Anti Spyware and anti malware
programs.
2. Avoid suspicious websites and never open email attachments
without screening them
3.A firewall is a program that screens incoming internet and
network traffic. Along with your virus program, it can help prevent
unauthorized access to your computer.
2). Trojan horse :-
a “Trojan horse” refers to tricking someone into inviting an attacker into a securely protected area. In computing, it holds a very similar meaning — a Trojan horse, or “Trojan,” is a malicious bit of attacking code or software that tricks users into running it willingly, by hiding behind a legitimate program.
They spread often by email; it may appear as an email from someone you know, and when you click on the email and its included attachment, you’ve immediately downloaded malware to your computer. Trojans also spread when you click on a false advertisement.
Once inside your computer, a Trojan horse can record your passwords by logging keystrokes, hijacking your webcam, and stealing any sensitive data you may have on your computer.
Prevention:-
1. Trojan Horses are often sent via email attachments in spam
emails. By downloading the file, you actively infect yourself.
Avoid opening any emails from people you don’t know.
2.Fake software is another common transmitter. The victim will
choose to install a program, without realizing it’s transporting a
Trojan. Only download well-reviewed apps and files from trusted
sources to avoid this issue.
3.You don’t always have to download a Trojan virus actively. Simply
visiting an infected website is enough to transfer the infection.
Avoid clicking through banner ads and visiting random sites to
reduce the risk.
4.Freeware is no-cost software that is easy to download. While
these free programs are convenient, Trojan horses are known to
piggyback on them. Do some independent research and read reviews on
any free program you’re thinking about installing before
downloading them.
3). DOS AND DDOS ATTACK :-
A DoS attack is performed by one machine and its internet connection, by flooding a website with packets and making it impossible for legitimate users to access the content of flooded website. Fortunately, you can’t really overload a server with a single other server or a PC anymore. In the past years it hasn’t been that common if anything, then by flaws in the protocol.
A DDoS attack, or distributed denial-of-service attack, is similar to DoS, but is more forceful. It’s harder to overcome a DDoS attack. It’s launched from several computers, and the number of computers involved can range from just a couple of them to thousands or even more.
Since it’s likely that not all of those machines belong to the attacker, they are compromised and added to the attacker’s network by malware. These computers can be distributed around the entire globe, and that network of compromised computers is called botnet.
Since the attack comes from so many different IP addresses simultaneously, a DDoS attack is much more difficult for the victim to locate and defend against.
PREVENTION :-
1. Buy more bandwidth
2. Build redundancy into your infrastructure
3. Configure your network hardware against DDOS attacks
4. Deploy anti- DDOS hardware and software modules
5. Deploy a DDos protection appliance
6. Protect your DNS servers
4).Phishing
Phishing is a method of a social engineering with the goal of obtaining sensitive data such as passwords, usernames, credit card numbers.
The attacks often come in the form of instant messages or phishing emails designed to appear legitimate. The recipient of the email is then tricked into opening a malicious link, which leads to the installation of malware on the recipient’s computer. It can also obtain personal information by sending an email that appears to be sent from a bank, asking to verify your identity by giving away your private information.
PREVENTION:-
1. Keep informed about phising techniques
2. Clicking on links that appear in random emails and instant messages try to avoid it if something went wrong
5). ROOTKIT :-
Currency is called parent class while Rupee is a child of Currency class. In object oriented programming term, Currency is super class while Rupee is a subclass. It means Rupee inherits all non-private members e.g. fields and methods
PREVENTION:-
1. Avoid opening suspicious emails
2. Avoid downloading cracked software
3.through system vulnerabilities a rootkit can get through to your computer system which be deal by installing software updates