1 / 8

Malicious Attacks

Malicious Attacks. Brian Duff • Nidhi Doshi • Timmy Choi Dustin Hellstern. Malicious Attacks. 1. Introduction. 2. Background and Evolution. 3. Preventative Steps. 4. Challenges. Introduction. What are malicious attacks?.

sana
Download Presentation

Malicious Attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Malicious Attacks Brian Duff • NidhiDoshi• Timmy Choi Dustin Hellstern

  2. Malicious Attacks 1. Introduction 2. Background and Evolution 3. Preventative Steps 4. Challenges

  3. Introduction What are malicious attacks? Malicious attacks can be defined as any attempt to undermine the privacy or security of a computer system, usually taking one of the following forms: Text Text • Virus • A program that copies itself into other programs that are executed, in order to wreak havoc. • Trojan Horse • A program that appears to be harmless, but which causes damage when run. • Phishing • The use of various forms of social engineering to trick computer users into giving away personal information. Text Text

  4. Introduction What are the goals of malicious attacks? The hackers, or people who engage in cyber attacks often have one or more of the following goals: Text • Identity Theft • Hackers often want to steal personal information, such as social security numbers or credit card numbers from a person or group of people. • Denial-of-Service Attack • Some viruses infect many computers, which combine to overload a secondary target, such as a government- or company-owned network. • Just for Fun • Some hackers simply enjoy destroying other people’s computers. Text Text

  5. Background and Evolution 1980s 1990s – early 2000s 2000s - Present Popularization of the personal computer. Malicious software first takes the form of trojan horses posted to bulletin boards (early messaging system) and simple viruses on floppy disks. The Internet becomes popular. Viruses become common as e-mail attachments. Examples include the Melissa virus in 1999 and the ILOVEYOU virus in 2000. Phishing and other social engineering attacks are on the rise. Viruses occur on a large scale in computers that are not protected.

  6. Preventative Steps What can be done to prevent malicious attacks? The following measures can be taken to help prevent a malicious attack: Text • For Viruses, Trojan Horses, and Worms • Install and maintain up-to-date antivirus software. • Install all security updates. • Never download files from the Internet unless it is from a trusted source. • If you think your computer has a virus, get help right away. • For Phishing • Be careful never to send personal information over e-mail or click hyperlinks within e-mail text. • If you ever doubt the authenticity of a message, contact the sender or legitimate organization before taking further action. Text Text

  7. Challenges What inhibits the prevention of attacks? Various factors make it difficult for people to stay protected from malicious computer attacks: Text • Effective antivirus software is often too expensive for some people to afford. • The source a virus is often difficult or impossible to pinpoint. • File sharing via the Internet or other means such as USB drives is increasing and will continue to increase. • Many people simply have not been taught how to recognize phishing attempts and scams. • Hackers are smart and are often one step ahead. Text Text

  8. Our Opinion How can we help? We think the following would help to decrease the success of malicious attacks: Text • Increased awareness of the dangers of the Internet and file-sharing • Development by trusted organizations of freely available protective software • Education about phishing and how to identify likely phishing attempts • Government involvement in countering large-scale viruses and cyber attacks Text Text

More Related