Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen
Intro/Background Malicious Attacks – electronic attacks in which an attacker attempts to access, steal, or destroy a user’s data without his or her permission
Trojan A type of virus that hides within a set of programs Stealing information from a user’s computer and sends it to designated Internet servers Most commonly spread through attachments
Worms A software program that has the ability replicate itself without a host program Spreads itself through network connections
Logic Bomb A virus inserted into a software system that launches an attack after certain conditions are met Most viruses attack host systems on specific days, such as April Fool’s Day or Friday the 13th
Phishing A process in which attackers seek to obtain personal information (such as passwords or credit card details) through the use of fake websites Often carried out by or instant messaging
Preventing Against Malicious Attacks Use strong passwords Firewall Install updated anti-virus software Use multiple virus scanners Remove unused communication ports Do not open from unknown sources