
Fortunately, antivirus software is available. Antivirus software is utility program that scans hard disks, diskettes, and the microcomputer's memory to detect viruses. Some utilities destroy the virus on the spot while others notify you of possible viral behavior. Examples of a virus software are Anti-Virus from Central Point Software, Norton Anti Virus from Symantec, McAfee virus protection software, and Virucide From Parsons Technology.
Worm is a program that copies itself repeatedly into memory or onto a disk drive until no more space left. An example is the worm program unleashed by a student at Cornell University that traveled through an e-mail network and shut down thousands of computers around the country.
Trojan horse(named after Greek myth) is a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the Trojan horse. Unlike a virus or worm, a Trojan horse does not replicate itself to other computers.
Computer viruses, worms and trojan horses deliver their payload on a computer in four basic ways: when a user (1) opens an infected file (2) runs an infected program, (3)boots the computer with infected removable media inserted in a drive or pluged in a port, or (4) connects an unprotected computer to a network.
Spoofing is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network. IP spoofing occurs when a intruder computer fools network into believing its IP address is associated with a trusted source.
Denial of service attacks or DoS is an assault whose purpose is t web or e-mail. Perpetrators carry out a DoS attack in a variety of ways.
Backdoors is a program or set of instructions in a program that allow users to bypass security controls when accessing a program computer o network. Once perpetrators gain access to unsecure computers, they often install a back door or modify an existing program to include back door, which allows them to continue to access the computer remotely without the user's knowledge.
Firewalls is a hardware and/or software that protects a network's resource from intrusion by user's another network such as the Internet. All networked ad online computer user's should implement a firewall solution.
Honeypots is a vulnerable computer that is set up t entice an intruder to break into it. Honeypots allow the company or organization to learn how intruders are exploiting their network and also attempt to catch perpetrators who have been doing damage elsewhere on their network. Large web hosting companies such as Yahoo! and AT&T, and law enforcement agencies frequently use honeypots.
A botnet or robot network is a group of computers running a computer application that only the owner or software source controls and manipulates. The botnet may refer to a legitimate network of several computers that share program processing amongst them. Usually though, when people talk about botnets, they are talking about a group of computers infected with a malicious kind of robot software, the bots, which present a security threat to the computer owner. Once the robot software (also known as malicious software or malware) has been successfully installed in a computer, the computer becomes a zombie or a drone, unable to resist the bot commander’s commands.
A botnet may be small or large depending on the complexity and sophistication of the bots used. A large botnet may be composed of ten thousand individual zombies. A small botnet, on the other hand, may be composed of only a thousand drones. Usually, the zombie computers’ owners do not know that an individual or a group of malware runners are remotely controlling and exploiting their computers through Internet Relay Chat (IRC).
There are various types of malicious bots that have already infected and are continuing to infect the Internet. Some bots have their own spreaders – the script that lets them infect other computers (this is the reason some people dub botnets as computer viruses) – while some smaller types of bots do not have such capabilities.
Source:
(Using Information Technology, Sawyer et.al:1997)
(Discovering Computers, Shelly G. et.al:2006)
(Discovering Computers, Shelly G. et.al:2007)
A botnet or robot network is a group of computers running a computer application that only the owner or software source controls and manipulates. The botnet may refer to a legitimate network of several computers that share program processing amongst them. Usually though, when people talk about botnets, they are talking about a group of computers infected with a malicious kind of robot software, the bots, which present a security threat to the computer owner. Once the robot software (also known as malicious software or malware) has been successfully installed in a computer, the computer becomes a zombie or a drone, unable to resist the bot commander’s commands.
A botnet may be small or large depending on the complexity and sophistication of the bots used. A large botnet may be composed of ten thousand individual zombies. A small botnet, on the other hand, may be composed of only a thousand drones. Usually, the zombie computers’ owners do not know that an individual or a group of malware runners are remotely controlling and exploiting their computers through Internet Relay Chat (IRC).
There are various types of malicious bots that have already infected and are continuing to infect the Internet. Some bots have their own spreaders – the script that lets them infect other computers (this is the reason some people dub botnets as computer viruses) – while some smaller types of bots do not have such capabilities.
Source:
(Using Information Technology, Sawyer et.al:1997)
(Discovering Computers, Shelly G. et.al:2006)
(Discovering Computers, Shelly G. et.al:2007)
No comments:
Post a Comment