Download presentation
Presentation is loading. Please wait.
1
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen
2
Intro/Background Malicious Attacks – electronic attacks in which an attacker attempts to access, steal, or destroy a user’s data without his or her permission
3
Trojan A type of virus that hides within a set of programs Stealing information from a user’s computer and sends it to designated Internet servers Most commonly spread through email attachments
4
Worms A software program that has the ability replicate itself without a host program Spreads itself through network connections
5
Logic Bomb A virus inserted into a software system that launches an attack after certain conditions are met Most viruses attack host systems on specific days, such as April Fool’s Day or Friday the 13th
6
Phishing A process in which attackers seek to obtain personal information (such as passwords or credit card details) through the use of fake websites Often carried out by email or instant messaging
7
Preventing Against Malicious Attacks Use strong passwords Firewall Install updated anti-virus software Use multiple virus scanners Remove unused communication ports Do not open email from unknown sources
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.