• What are Threats & Types of Computer Security Threats?

    What are the Threats?

    cyber security threats,internet security,threat intelligence,cyber threats,cyber threat intelligence,cyber protection,computer threats,computer security threats,cyber risk,network threats,security threats,information security threats,network security threats,cyber security,vulnerability,vulnerability assessment,vulnerability management,what is vulnerability in computer security,what is vulnerability in computer,vulnerability in cyber security,types of vulnerability in cyber security,definition of vulnerability in cyber security,what is vulnerability scanner,what is the meaning of vulnerability scanner,what is the definition of vulnerability scanner
    What is the Threat

    The threat is something that may or may not happen, but has the potential to cause serious damage.


    The threat can be anything that can take advantage of a vulnerability to breach security.
    In Information Security threats can be many like Software attacks, identity theft, theft of equipment or information, sabotage, and information gather.

    There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. 


    If You Read About What Is Firewall? Click On Link and Read Out.

    Many users believe that malware, virus, worms, bots are all the same things. But they are not the same, the only similarity is that they all are malicious software that behaves differently.

    Network-delivered threats basic two types:-

    Passive Threats
    • (a) Release of message contents
    • (b) Traffic analysis
    • (c) Eavesdropping

    Active Threats
    • (a) Masquerade
    • (b) Replay
    • (c) Modification of message contents
    • (d) Denial of service

    Release of Message Contents

    A release of message content, a telephonic conversation, an e-mail message or a transferred file may contain confidential data. A passive attack monitors the contents of the transmitted data.

    Traffic analysis

    • Traffic analysis is done through a network monitoring or network bandwidth monitoring software/application.
    • Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.
    If You Don't Know About What Is IDS? Click On Link and Read Out.

    Eavesdropping

    Eavesdropping is the unauthorized real-time interception of private communication, such as a phone call, instant message, video conference or fax transmission.

    cyber security threats,internet security,threat intelligence,cyber threats,cyber threat intelligence,cyber protection,computer threats,computer security threats,cyber risk,network threats,security threats,information security threats,network security threats,active attack,what is active attack,active attacks,what is passive attack,active,what is active attack in network security,what is passive attack?,passive attack,what is security attacks,what is passive attack in network security,what is meaning of masquerade attack,attacks,what is passive attack in network and cyber security?,passive attacks,what is information security,types of active attack
    Threats

    Masquerade

    • A masquerade is a type of attack where the attacker pretends to be an authorized user of a system to gain access to it.
    • It takes place when one entity pretends to be a different entity.
    • A masquerade attack usually includes one of the other forms of active attack.

    Replay

    It involves the passive the capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

    Modification of message contents

    In a message modification attack, an intruder alters packet header addresses to direct a message to a different destination or modify the data on a target machine.

    Denial of service

    • In a denial of service (DoS) the attack, users are deprived of access to a network or web resource. 
    • A denial of service attack takes place when the availability to a resource is intentionally blocked or degraded by an attacker.
    • In a distributed denial-of-service (DDoS) exploit, large numbers of compromised systems (sometimes called a botnet or zombie army) attack a single target.

    Types of Computer Security Threats

    Malware is a combination of 2 terms- Malicious and Software. So Malware basically means malicious software that can be an intrusive program code or anything that is designed to perform malicious operations on the system.

    It is Mainly 2 Types:-

    • Infection Methods
    • Malware Actions


    Infection Methods:-

    cyber security threats,internet security,threat intelligence,cyber threats,cyber threat intelligence,cyber protection,computer threats,computer security threats,cyber risk,network threats,security threats,information security threats,network security threats,what is malware,what is malware?,what is virus,what are virus?,what are malwares,what is spyware,what is worm,what is worms,what is a virus,malware,what is trojan,what is trojan horse,what,what is virus in computer,what is adware,what is virus in hindi,what is malware in hindi,what is a computer virus,what is trojan horse virus,what is trojan virus,spyware,antivirus,adware,what is walware,is
    Threats
    Computer Virus
    • A Computer Virus is a malicious program, it's written to alter the way a computer operates, without the permission or knowledge of the user. 
    •  Viruses are known to send spam, disable your security settings, corrupt and steal data from your computer including personal information such as passwords.
    • The Creeper virus was first detected on ARPANET. Examples include File Virus, Macro Virus, Boot Sector Virus, Stealth Virus, etc.

     Worms –

    • Computer worms are pieces of malware programs that replicate quickly and spread from one computer to another if the network is available and on the target machine.
    • They will, for example, consume hard disk space thus slowing down the computer.


    Trojan –

    • Once inside your computer, a Trojan horse can record your passwords by logging keystrokes.
    • when you click on the email and its included attachment, you’ve immediately downloaded malware to your computer. Trojans also spread when you click on a false advertisement.
    • when that software is executed they will do their task of either stealing information or any other purpose for which they are designed.

    Bots –

    The malicious bot can infect one host and after infecting will create a connection to the central server which will provide commands to all infected hosts attached to that network called Botnet.
      
    Malware Actions:-

    Adware & Spyware -

    • spyware is any program that monitors your online activities or installs programs without your consent for profit or to capture personal information.
    • One of the most common examples of spyware is KEYLOGGER.
    • Adware collects data with your consent — and is even a legitimate source of income for companies that allow users to try their software for free, but with advertisements showing while using the software.
    • The presence of adware on your computer is noticeable only in those pop-ups, and sometimes it can slow down your computer’s processor and internet connection speed.
    Ransomware –
    • It is a type of malware that will either encrypt your files or will lock your computer System.
    • Then a screen will be displayed asking for money
    Rootkits – 
    Rootkit is a collection of software tools that enables remote control and administration-level access over a computer network. Rootkit masks viruses and worms and makes them appear as necessary files. Once gained the root access, the exploiter can do anything from stealing private files to private data.


  • You might also like

    No comments:

    Post a Comment