Page 23 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 23

Unit 2: Threats




          Other examples of information-based threats are setting up revenge websites and disseminating  Notes
          on biased information as in the case of the false acquisition. Such attacks can cause considerable
          damage to the goodwill of the organization against which they may be launched, and customer
          loyalty is too good to lose.
          Propagation of information that is expected to trigger particular counter-reactions as in the case
          of  say  some  threadbare  job  advertisement  also  considered  as  information-based  threat.
          Fundamentally  a DoS attack that  is dependent on flooding accounts with large quantities of
          e-mail is a network-based attack as it is the size and the magnitude of the email that is significant
          and not the content of the e-mail.





              Task  Discuss information-level and network level threats with examples.

          Self Assessment

          Fill in the blanks:
          4.   In case of ................... threat, latent attackers need network access to corporate computer
               systems or to networks accessed by corporate computer systems.
          5.   Transferring false inquiries to service accounts to eat up resources would qualify as an
               ................... attack.

          2.3 Threats and Attacks

          Attacks can be represented  by relation among threat, vulnerability, and  damage. To  avoid
          attacks from viruses and worms, a latest version of anti virus software should be used. Security
          threats related to computer crime or abuse include:

          2.3.1 Computer Viruses

          The term virus refers specifically to malware inserting malicious code into existing documents
          or programs. It spreads itself by various means. Still viruses are considered the most common
          type of network security threat. Almost 90 percent of viruses are spread through attachments on
          e-mails. However, a cautious user action may prevent the spread of virus because virus requires
          a user action to insert itself into a computer. It is therefore suggested that never open an email
          attachment, which is not expected, even though the sender appears to be known. However, this
          preventive measure will do little to stop worms from infecting the network because worms do
          not need a host file and they propagate themselves.




             Did u know? When worms infect a computer, they often make quick copies of it and infect
             an entire network within a few hours.

          2.3.2 Trojan  Horses

          This malware attack disguises itself as something innocent like a computer game or a search
          results page. Once installed on a computer, the Trojan horse may download and install a keylogger
          onto the infected computer to record every keystroke by a computer’s user, thus stealing vital
          details of the users. They usually hide themselves in a downloadable free software on a website.




                                           LOVELY PROFESSIONAL UNIVERSITY                                   17
   18   19   20   21   22   23   24   25   26   27   28