0% found this document useful (0 votes)
38 views17 pages

IT_UNIT 3 (VIRUS)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views17 pages

IT_UNIT 3 (VIRUS)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Information Technology & ts Application in Business (Theory)

But, Internet users seem


to be mesmerized of
and hypnotized by the beauty and the
online social powe
networking tools which are able to
social
enhance virtual communication capaou
networking with endless future
potential extension.
Facebook and Twitter are two of the most h
popular social networking sites
cOmmonly used nowaaay "
on
daily basis by most of the internet s
population to interact with their rar
and
fnends, build business
appearance or meet with other internet users. Both sie> be
considered as the
best example to portray how sOcial of
life. networking really has changeu

SOCial
networking has evolved
through internet and has added different co
Tiavors according to the needs
of time. There are plenty of features being offered oy ocial
networking sites (SNS) which include making our profile, finding people with mutual
Sanngwin our Circles or
interesi
groups, interacting with people in our groups and geting uthe
information shared by other
people.

Ethical Dilemmas

With the rise of Online


Social Networking, the ethical dilemmas are growing in number including9
violation of privacy,
misrepresentation, bullying and creepiness. When the consumers are
getting the facility of relatively unrestricted social communications they are
vulnerable to
becoming more
deception and scams too at the
same time which
has become the reason
of attention for Social
Networking Ethics Few ethical dilemmas faced when
use social networks different people
are given below:
lnvasion of privacy The invasion oT
privacyY would include any
approach taken to get any kind
of personal or
non-permissive
any other kind of
individual which can harm him or affect him in any
informatic
ation about an
sense.
While discussing social media ethics,
benavioural
onsider. The advertisers targeting is a
questiona
tracking our shopping
to use that data in behaviours and click
re-targeting campaligns. he positive
sitive
through patterns
point
point iis
that the
viewers may
Information Technology & ts Application in Business (Thes
eory
appreciate the relevance of the material being advertised to them but this is a of

invasion of privacy.

users are usually bombarded with some kind of information


Spamming: In spamming,
which does not interest them or even if it does, it is too expensive to be swallowed

In this situation, the users relative information which s/he may be needing, gets
under the pile and may get ignored because of that useless pile of spamming

which is obviously unethical from user's perspective.

Public Bashing: While using social networks people think that they are private and

they can express anything they want to but they are not as private as they think. Once

we have posted something, it is not ours anymore and it can go viral as fast as a fire in

the forest without asking for our permission which then can't only affect our

reputation but also the person or company. This kind of cases can also raise a risk for

legal lawsuits
Dishonesty and Distortion: There is no fair enough method to validate the honesty

and authenticity of social networking activities of users. The intensions of social

media usage include transparency of communications and other activities


posts through
SNS. It is unethical to be dishonest about anything even on social networks. So, if we

make dishonest claims about ourselves or anything else or go on commenting


offensive material, it is going to affect ours or our company at the end. By doing
such activities we are jeopardizing our personal reputation and our company's name.

So, we should all keep ethics in front of use even while using social media.

Improper Anonymity and Distorted Endorsements: If one represent himself/ herself with

wrong affiliations, credentials or expertise, it is unethical to become anonymous but

showing ourselves to be someone different than we are.

Security Threats
Information/ data security has become a continuing concern in all of
areas an Information
system. Security is neither a product nor software; it is a discipline that needs to be taken into

consideration in any organizational decision. It is indeed true that there is no existence such

22
Business (Theory)
Application
in
Technology
& Its
Information

security
that by increasing the
also correct
secure system. But it is
'completely
thing as a which, in turn,
a much more difficult target for intruders,
and system
measures that protects data
are in place.
of becoming a victim
when the right security technologies
reduces the chances
and intention to do
armed with technical capability, opportunity
But it is also true that, anyone
in the following
threat of computer data. So, e-security of data may be categorized
harm, is a

ways
editing of existing data.
or unauthorized access
of users and modification/
Authorized

internal users or external users from any organization.


Access of data by
Security Threats

Human Threats Natural Disasters Threats

Intentional harm

Insider attacks

Outsider attacks

Unintentional harm
To counter against security threats of data, the following measures can be taken:
Confidentiality: This means secret data must remain confidential. This means that if
somebody wants some data to be available to certain
people, then the operating system
must make that data available to those
particular people, with no one else allowed to see
that data. It prevents unauthorized disclosure of secured information.
Integrity: This means restricting unauthorized modification of secured information.
Unauthorized users must not be allowed to
modify the data without the
owner's
permission. Data modification includes not
only changing or
deleting data, but also
removing data or adding false data to change its behaviour.

23
Information Technolbyy

unusable. It assures
to make it
disturb
distu
the system
can
can
nobody
n obody
authorized users. This
is not denied to
m e a n s

This
service
v

A v a
a i l a b i l i t y :

and that
promptly,

denial of service to
works
system
causing a
the information,
that
u s e r s by
nolding
withhold
unauthorized

estrict
is to
authorized users.

users. Users can

the system must


able to verity the identity of
This means
Authenticity:
of username and password or matching
a combination
login to the system by providing

parameters.
any other security

Types of threats (Intentional harm):


Insider attacks

Outsider attacks (Malicious codes)

Insider attacks
Login Spoofing: It is a technique of collecting other users' passwords. A false login

interface that seems identical to the real thing is mounted on an actual login screen.

Trap Doors: It is a kind of login programs written by developers to gain unauthorized

access. For example, a developer could add code to a login program to allow anyone

using a particular login name (like "student'), no matter the password. If this code is

inserted into a working program, the login succeeds by entering the login name as

"student" with any password or with a blank password.

Logic Bombs: These are code embedded in a program that is set to explode when

certain conditions are met. The conditions used to trigger the bomb can be the presence

or absence of certain files, a particular day date,


or a particular user running the
application, etc.

Once triggered, a bomb may alter or delete data or sometimes entire files, causing a

machine halt or dealing some other damage. For example, if a developer is fired, the
logic bomb will trigger upon not receiving his daily password to a certain portion of code,
or when any.other set of conditions are
satisfied.

24
O u t s i d e ra t t a c k s
Ransomware)
Worm, Spyware,
codes- Virus,
Trojan Horse,
(Malicious

has
Virus (Computer Virus) host and
spread from host to
loaded and
designed to get viruses
program
virus is a small Computer
Computer user's knowledge.
without the
computer
itself in the
replicate
the ability to
without programming.
spread alter
reproduce
and written to
cannot
malicious code or program
virus is a type of
technical terms, a computer to another.
It is
In more
from o n e computer
spread
that is designed to
operates and or
the way a computer the system
memory
and finally halt
utilize all available
that is quickly
a such a piece of code has successfuly
attached
Once a virus
delete the files
from the computer.
it may corrupt/ cause the
even circumstances
dormant until
the virus will lie
document,
to a program, file, or
on any
virus can remain dormant
that a
code. This means
device to execute its
computer or

major signs or symptoms.


computer, without showing on the same
infect other computers
the virus can

However, once the virus infects any computer,


our email
corrupting files, spamming
or data, logging keystrokes,
network. Stealing passwords
and irritating things
taking over our machine are just some of the devastating
contacts, and even

a virus can do.

evasion or obfuscation capabilities that are designed to bypass


Many viruses also include

and other security defences. The rise of


modern antivirus and anti-malware software

which can dynamically change its code as it spreads, has


polymorphic malware development,
difficut to detect and identify.
also made viruses more

virus was developed in 1971 by Robert Thomas, an engineer at BBN


The first known computer
virus, Thomas experimental program infected
Technologies. Known as the "Creeper
displaying the teletype message,
"Tm the creeper: Catch me if vo
mainframes on ARPANET,

can."
viruses include the "Brain" virus, which initially appeared
in
of early computer
Notable examples
MS-DOS personal computer virus. Brain was a
oot
to be the first
10R and is considered
25
Technology
& NS

Information

a new
i n s t a l l e d on
once
sectors and,
disk boot
floppy inserted
infected

new disks
through infect any
spread subsequently
virus. It and
sector
system's mem
emory
the
tself to
install
would
PC, it
discovered in 1987 and
was
into that PC. Virus,
a s the "riday
the 13
also known
virus, would infect a
The
"Jerusalem"
attachments. The DOS virus
email
disks and
Israel via floppy
spread
throughout
calendar reached Friday the 13th
when the system's
and programs
delete all files If the
system and email attachment.
as an
was distributed
first appeared in 1999,
The Melissa virus, which
the first 50 people in
an

Outlook, the virus would be sent to


Microsoft
infected systems had
also affected m a c r o s
in Microsoft Word and
infected user's contact
list. The "Melissa" virus

the program.
disabled or lowered security protections in
affected Nokia Symbian
verified example of a Mobile phone virus and
"Cabir" virus is the first
because it proves that a virus
Cabir is considered a 'proof-of-concept' virus,
operating system.
doubted.
phones, something that was
once
can be written for mobile

Viruses can be spread through

Attachment in email and/or IM/ text message attachments,

Social media scam links,

Internet file downloads or socially shareable content such as greetings cards, audio/

video files,

Visiting an infected website or viewing an infected website advertisement,


Infected removable storage devices, such CD/ DVD/ Blu-ray/USB drives,

Mobile devices and smart-phones (through App download).

Types of Virus:

The following are some common types of Viruses


System or boot infectors viruses: These viruses infect executable code found in
certain system areas on a disk. They attach to the USB thumb drives or the Master Boot
Record of the Hard disks. The boot record is a program that loads the OS (Operating
System) in the memory when
computer is turned on. Now boot record viruses replaces

26
Information Technology & ts Application in Business (Theory)

hidden inside is
transferred to the user's computing device.
that Is
eorogram, the malware

can execute whatever


task the attacker designed it to carry out.
malicious code
Once inside. the
unaware that a Trojan horse has been installed, the computing
user is often
Because the
software that can recognize
malicious code,
ant-malware
depends upon
device's security
should keep their anti-
remove it. To avoid being infected by Trojan malware, users

isolate and
s o u r c e s or download files from
click on links from un-trusted
virus software up-to-date and never

unknown senders.

A Trojan can cause the following

infected computer.
Allowing remote computer to
access

information likes password, pin number.


Stealing confidential

Deleting data even all vital files.


Installing virus or Trojan horse on the computer.

Blocking and modifying data.

Copying or moving data


Disrupting the perfomance of computers or a network.

The following are some common types of Trojan horses:

Trojan-Mail-finders:It harvest email addresses from our computer which are then sold

to email marketing and spam companies.

Trojan-downloader:lt does just what it says - is downloads and installs new versions of

malware, including adware and new Trojans.

Rootkit Trojan: It conceals objects and activities on the infected computer. They are
primarily used to avoid being detected by security software, buying time to take further
advantage of the hack.

Trojan-iM: It steals our


logins and passwords from instant
messaging platforms like
WhatsApp, WeChat, Skype, QQ and more.
Trojan-Banker:lt is specifically designed to steal our financial
data bank logins, debit
-

credit card and trust account


information.

29
I n f o r m a u O n

tally
incremental install
more
downloader
that
isticated
more
sophist software less
a security
is make
detection by
to
T r o j a n - d r o p p e r : t

as
in such a way
viruses
and
new
Trojans
known
of a
likely. takes advantage
contains code that
program
that
It is a
Exploit Trojan: the infected computer.
on
software running
within a piece of
vulnerability
information from online gamers.
user
Thief:lt steals
Trojan-Game
longer use it
to where we can no
modifies our computer to the point
Trojan-Ransom:lt
restore the
paying a cash ransom it may (or may not)
or access certain data. In return for

victim's access to the data.

and logs our activity doing everything from


Trojan-Spy:It is aptly named in that it spies
screenshots and then sending that data
copying every keyboard button pushed to taking
out to a hacker or hacker network.

Trojan-Fake AV:t is a program that simulates the activity of antivirus software. They are

designed to extort money from the target in return for detection and removal of threats -

even though those threats are fictitious.

Backdoor Trojan: it gives the hacker remote control over the infected computer.

Trojan-SMS:It is relatively simple and can be very expensive. It invades our cell phone

and surreptitiously sends numerous fee-based SMS messages, which end


up on our

cellular phone bill.

Examples of few Trojan horses:

Over the years, Trojan horses have been discovered by anti-malware vendors, security
researchers and private individuals. Some of the most famous
discoveries include:
Zeus: A financial services crime-ware
toolkit that allows a hacker to build his own
Trojan horse. First detected in 2007, the
Trojans built with Zeus still remain the most
dangerous banking Trojans in the world, using form
grabbing, key-logging and
polymorphic variants of the Trojan that use
drive-by downioads to capture victim
credentials..
in Business (Theory

Information Technology & Its Appl

(RAT) that infected


Windows clien
Bitfrost It is a remote access Trojan

changing., creating and altering components.


information. In z0i6
sensitive financial
allowed attackers to steal
iny Banker:It
banks.
Tinba' affected more than two dozen major U.S.
created by the FBI
around the turn
o
Magic Lantern: It is a keystroke logging Trojan

criminal surveillance.
the century to assist with

Worm (Computer Worm) termed as

software program
(popularly
wom is a malicious, self-replicating
A computer worms are
hardware programs.Most
affects the functions
of software and
malware) which lInternet
some spread by tricking
software, although
known security holes in
designed to exploit

users. arrive in
or instant message
(IM). They
email
worms, for instance, spread via
Mass-mailing
our machine.
download them the worm silently infects in
attachments and once we
message
Cybercriminals upload infected
avenue for worms.
networks are another
Peer-to-peer (P2P)
And once it is downloaded,
to entice users into downloading them.
names
files with desirable

infected.
the computer is
For example, it can also self-
of a computer virus in many ways.
Wom fits the description
are often referred to as viruses
across networks. That is why worms

replicate itself and spread


viruses in certain aspects.
worms are
different from computer
also. But computer
they can diffuse themselves
to cling on to files (host files) before
viruses which need
First, unlike
entities or standalone software. They do not need
worms exist as separate
inside a computer,

host files or programs.

worms do not alter rilesS Dut reside in active memory and duplicate
Secondly, unlike viruses,
that are automatic and usually invisihle to
themselves. Worms use parts of the operating system
the system Decomes apparent only when their uncontrolled
the user. Their existence in

slowing or halting her tasks in the


replication consumes system resources, process. In order
to spread, worms either exploit the vulnerability of the target system or use some kind of social

31
Information 1e

enter a system, thev take


them. Once they
executing
u s e r s into
method to trick allows them to
engineering features in the system that
information-transport
or
file-transport
advantage
of

travel unaided.
attacked
the world over recently when it
worm' turned heads
worm called 'Stuxnet
A computer

facilities of Iran.
the nuclear

However, once worm is infected in machine,

and overall system performance


Degrade Internet connection
access to computer.
Installa backdoor giving cyber-criminals
I t can corrupt files.

Steal sensitive information.

make machine more vulnerable.


Modify system settings to our

The most dangerous part of worm is, it can replicate itself over 3, 00,000 times in just few hours

thus slow down the whole system as well as Intemet speed.

Spyware
It is malicious program that is loaded onto a PC surreptitiously and runs in the background,

monitors users activity and report that information without user's knowledge. Spyware is

generally used from tracking and storing Internet browsing patterns of users and try to get users

bank details, pin number and debit/ credit card information.

Simultaneously, it serves pop-up ad to Internet users, installing additional software, reading

cookies, reducing internet speed. Moreover, spyware is also responsible to redirect users to un-

trusted sites.

Ransomware
Aransomware' virus is used strong encryption to encrypt users' files and data. Ransomware is a

subset of malware in which the data on a victim's computer is locked, typically by


encryption,
and payment is demanded before the ransomed data is decrypted and access returned to the

victim.

2
Information Technology & Its Application in Business (iheory

this type of viruses


or overwrites infected system's boot record. Examples of
or moves

are Disk killer, Polyboot. B, AntiEXE etc.


themselves to
viruses attach
File infectors or Program Viruses: These types of
extensions such as .com,
executable files with the
program files, usually they infect only
along with it
virus is loaded
is executed, the
bin,.drv,.sys .exe etc. When the program
But it is a
to this category.
in the memory. Most of the viruses belong
nd gets loaded
Examples of these
can be removed easily.
level virus as they
better option than Boot

Cascade etc.
are, Jerusalem,
types of viruses in
commands
macro language
viruses: These viruses specifically target
Macro
macros are saved
Microsoft Word/ Excel and
other programs. In Word,
applications like
Macro
embedded in the documents.
for commands or keystrokes that are
sequences

macro sequences in a Word/ Excel


viruses can add their malicious code to the legitimate

virus infected file is opened on another computer, the virus spreads


files. When a macro

viruses are Bablas, Relax, Melissa etc.


in that computer too. The example of macro

that has the ability to


Polymorphic viruses: A polymorphic
virus is a type of virus
features. It
change or mutate its underlying code without changing its basic functions or

is also creates copies during replication and each infection is different from the other

removalby anti-malware/
This process makes that virus to evade identification, detection,

anti-virus.The examples of polymorphic viruses are Marburg, Satan Bug etc.


Overwrite viruses: Some viruses are designed specifically to destroy a file or

application's data. After infecting a system, an overwrite virus begins overwriting files

with its own code. These viruses can target specific files or applications or systematically

overwrite all files on an infected device. An overwrite virus can install new code in files

and applications that programs them to spread the virus to additional files, applications

and systems.The examples of overwrite viruses are Trj.Reboot, Way etc.

FAT virus: It is a File Allocation Table (FAT) virus. FAT is a table, which is maintained

by Operating System to store information about size; location, details of files on the disk.

This FAT virus attacks File Allocation Table and makes


computer system impossible to

27
Information Technology

forces
Operating System and
the whole
files. Thus it disrupts
access and locate existing

user to re-format the system. of a system.


the memory (RAM)
virus embeds itself in
of
Resident viruses: This type even if the
applications,
new files or
isn't needed to infect
h e original virus program The
be activated.
can
stored in memory (RAM)
the version
ornginal virus is deleted,
etc.
examples of resident viruses are CMJ, Meve, Randex
When user's machine
of virus changes the location of a file.
Directory virus: This type
user clicks on a
virus infected file of
IS infected by this type of virus and unknowingly if

other location.
some directory, that original file will be moved to some

Trojan horse (Computer Trojan horse)


In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

Once it i executed, it may slow down the computer, may cause loss or theft of data or may be

given unauthorized access to computer or even install a virus.

Trojan was first appeared in 2006 but has evolved over the years and continued to cause

problems as new variants emerge.The Zeus' Trojan, one of the most well-known and widely

spread viruses in history. The Zeus Trojan was initially used to infect Windows systems and

harvest banking credentials and account information. This Trojan spreads through phishing
attacks, drive-by downloads and man-in-the-browser techniques to infect users.

A Trojan may also be referred to as a Trojan horse virus, but that is technically incorrect. Unlike

a computer virus, a Trojan horse is not able to replicate itself, nor can it propagate without an

end user's assistance.

The term Trojan horse stems from Greek mythology. According to legend, the Greeks built a

larae wooden horse that the people of Troy pulled into the city. During the night, soldiers who

had been hiding inside the horse emerged, opened the city's gates to let their fellow soldiers in
and overran the city.

In computing, attackers must use social engineering tactics to trick the end user into executing
the Trojan. Typically, the malware
programming is hidden in an
innocent-looking email
attachment or free download. When the user clicks the email
on attachment or downloads the

28
Business (Theory)
Information Technology & its Application in

is often demanded in a
The motive for ransomware attacks is nearly always monetary. Payment
isn't known.
'bitcoin', so that the cyber-criminal's identity
virtual currency, such as
infected software
malicious email attachments,
Ransomware malware can be spread through
number o
websites. A growing
devices and compromised
apps, infected external storage of
that don't rely on any form
and other approaches
attacks have used remote desktop protocol

ransomware are Cryptolocker and WannaCry


user interaction. Famous
locked the user's phone
A malicious Android app
As of 2015, there is also Mobile
ransomware.

and changed its access PIN number, demanding a payment.

Ransomware prevention:
users to
To protect against ransomware attacks and other types of cyber-extortion, experts urge
back up computing devices on a regular basis and update software including antivirus

sofware on a regular basis. End users should beware of clicking on links in emails fromn

strangers or opening email attachments. Victims should do all they can to avoid paying

ransoms.

Hacking
Hacking can be classified as, identifying weakness in computer systems and/or networks and

exploiting the weaknesses to gain access. An example of hacking is using by passing the login
algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in
computer systems and/or networks to gain access. Hackers are usually skilled computer
programmers with knowledge of computer security.
Types of Hackers

Hackers are classified according to the intent of their actions.


The
hackers following list classifies
according to their intent,
Ethical Hacker
(White hat): A hacker who gains access to
systems with
theidentified weaknesses. a view to fix
They may also perform penetration testing
assessments. Ethical and
hacking is all about
vulnerability
and/or computer improving the security of
networks and it is
computer systems
legal.

33
& 1
TechnologIy

Information

c o m p u t e r

and/or
rules.
following system

by the computer

ofthe
abide
must
hackers o w n e r

Ethical the
from
p e r m i s s i o n

written

G e t

network before hacking. hacked.


been to
organization
system
computer
of the
Protect thee privacy w e a k n e s s e s
in the
identified

report
all the
ransparently

weaknesses.

the organization.
identified
vendors of the Tor
software
hardware and systems
Inform
access to computer
unauthorized
gains
hat):A hacker who transter
Cracker (Black
violate privacy rights,
data,
intent is usually
to steal corporate
personal gain. The

etc
funds from bank accounts breaks into
hat hackers. He/she
and black
hacker who is in between ethical
G r e y hat: A
reveal them weaknesses and
view to identify
computer systems without authority with a

to the system owner.

gains access to computer systems usin9


Script kiddies: A non-skilled person who

already made tools.

Hack-tivist: A hacker who use hacking to send social, religious, and political etc.

websites and leaving the message on the


messages. This is usually done by hijacking

hijacked website.

Spoofing
fraudulent or malicious practice in which communication is sent from
Spoofing, in general, is a

an unknown source disguised as a source known to the receiver. Spoofing is most prevalent in

communication mechanisms that lack a high level of security.

In other words, spoof refers to hacking or deception that imitates another person, software

of bypassing security measures.


program, hardware device, or computer, with the intentions
email spoofing etc.
Most commonly known spoofing are IP spoofing,

There are different types of spoofing

IP spoofing
34
( T h e o r y

Business

in
Application

nformation Technology & Its

E-mail or Address spoofing

.
Phone number or Caller ID spoofing
Web page spoof of
gaiing

way
or a
network

IPspoofing: A method of bypassing security measures on aa nerwO way


of
have a
s y s t e m s

access to a network by imitating a different IP address. Some securiny >y* spoofs


attacker

If the
range.
her IP address or IP address is
nelping to identifying a user by his/
InS
measures.
help bypass security is
"

GSs
to match
this criteria it may user

into thinkingu
UUsed to deceive a web page, pol, or other Internet contest
vote
her to get more hits or falsely increase a Dal
someone else allowing him or e
a

spoofing is the process of faking s


Email o r Address spoofing: E-mail or Address the
someone
else sent
ue
of the e-mail into thinking
address to fool the recipient a
ma to be
Tron

information and may appear


emails may request personal
message. Spoofed number TOr
an account
the recipient to reply with
known sender. Such emails request
sucn
purposes,
account number for identity theft
spoofer then uses this
verification. The email
so on.
contact details and
bank account, changing
as accessing the victim's
like Trojans or other viruses. These
contain additional threats
So a spoofed email may also
activities, remote
can c a u s e significant computer damage by triggering unexpected
programs

access and deletion of files.


telemarketers to hide
Phone number or Caller ID spoofing: This type of spoofing is done by

hackers to gain access to unprotected phone voice-mail messages.


their true identity and by
make calls using numbers that are similar to
A common recent tactic used by telemarketers is to

ours. For example, we may be in the 304 area code with the prefix 123 and get numbers from

304-123-4567. Although this form of telemarketing is illegal telemarketers use this tactic

because more people are likely to answer phone calls from local numbers.

Web page spoof: A fake web page or spoof on another commonly visited page. For example, a

malicious user may create a spoof page of Microsoft's, eBay, PayPal or Google's homepage
that looks identical but is hosted on a different server. These pages are commonly used in
phish ing e-mails to extract information from the user such and
as usernames
passwords.
35
in Busin
& fts
Application
siness
T e c h n o o g y

Information

data as it is
capture
individuals
to
Sniffing Sniffing
allows
to diagnosee
synonyms. professionals
snooping
is network
and
oing
is used by and
technique passwords
This
over a
network.
data like
n s m i t t e d
unencrypted
users to capture or
malicious
to a system
1Ssues and by access
WOTK

a u s e r can
gain
is captured
in transit,
information
Sernames. if this

network.

Phishing the Internet ror


over
lingo for fishing
Similar to fishing in a lake or river, phishing is computer
act was recorded.

personal information. The term was first


used in 1996, when the first phishing
such
sensitive information,
in computing, phishing is the fraudulent act
of acquiring private and

and account usernames and passwords.


as credit card numbers, personal identification

and computer programming expertise,


USing a complex set of social engineering techniques
into believing that a spoofed website is
phishing websites lure email recipients and Web users

legitimate and genuine. In actuality, the phishing victim later discovers his personal identity and

other vital information have been stolen and exposed.

In other words, phishing is the practice of defrauding users into giving up their usernames,

passwords, credit card numbers and other personal information.


The following security precautions are recommended:

Never divulge personal information requested by email, such as name or debit credit

card number and PIN number.

Verification of the Website's phone number is needed before making any calls to the

number provided via email.

Using of updated computer security tools, such as anti-virus software, spyware and

firewall.
Never open unknown or suspicious email attachments.
Web
by typing the actual address in the
the website URL for legitimacy
.Doublecheck
browser

Spamming
commercial purposes.
email sent indiscriminately in bulk, often for
Spam is unsolicited junk
of electronic messaging systems like
e-mails and other digital delivery
Spamming is the use

send unwanted bulk messages indiscriminately.


systems and broadcast media to

applied to other media like in internet forums, instant messaging and


The term spamming is also

mobile text messaging, social networking spam, junk fax transmissions, television advertising

and sharing network spam.

Spamming (especially e-mail spam) is very common. According to various estimates, about

60% to 75% of all email in the world may be spam. Most spams are commercial advertising, but

some contain viruses. adware. Spams are becoming ever more sophisticated and specifically

targeted. Even an email that seems to come from a familiar source could still be fake.
*

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy