1 / 0

Malicious Attacks

Malicious Attacks. By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero. Viruses. A computer program that can copy itself and infect a computer. Non-Resident Viruses- Resident Viruses-. Worms. Self Replicating computer program

odette
Download Presentation

Malicious Attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Malicious Attacks

    By: Jamie Woznicki Rahul-AnaadiKurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero
  2. Viruses A computer program that can copy itself and infect a computer. Non-Resident Viruses- Resident Viruses-
  3. Worms Self Replicating computer program Does not need to be attached to an existing program.
  4. Phishing Criminal process of trying to acquire sensitive information such as usernames, passwords, credit card information and addresses. Scam usually involves posing as a trustworthy website and asking for sensitive information. The phishing websites look much like the original ones, but with slight differences.
  5. Phishing Nowadays, phisers are targeting bank customers and online payments. Damage due to phising includes: Financial loss Inability to retrieve email Embarrassment Etc.
  6. Phishing Different types of phishing: Website Forgery Filter Evasion Link Manipulation Social Engineering
  7. Spyware a type of malware that is installed on a person’s computer and collects information about said person without said person’s knowledge. Results in loss of internet functionality
  8. Prevention Increase knowledge about the types of malicious attacks Update virus protection software Be Smart!
  9. Conclusion
More Related