Page 53 - PlusGPT_V2.1_C8_Flipbook
P. 53

When a program  runs repeatedly, program viruses are deliberately loaded in a program by the
                 developer. A program file infecting virus is also known as a ‘File Injector’. Sunday and Cascade are the
                 common examples of program viruses.


                      Spam

                 Spam refers to an unwanted and unsolicited message which is received in the inbox of a person’s
                 e-mail account or in newsgroups. The one who sends the spams is called a ‘Spammer’. Generally,
                 spams are sent with an intention to advertise products and services.


                      Symptoms of a Malware and Virus Infection

                 When virus infects human beings; it damages the body which is evident through certain symptoms.
                 In the similar manner, there are certain symptoms that hint that a computer has been infected by
                 malware and virus, like:
                 ·   Slowdown: Fall in speed of processing of computer.

                 ·   Pop-ups: Appearance of unexpected pop-ups on the system.
                 ·   Crash: Frequent crashing of system or BSOD (Blue Screen of Death).

                 ·   Running Out of Storage Space: Occupying huge space of storage.
                 ·   Loss of File: Abrupt deletion of files of a computer system.

                 ·   Unusual activity of messages or programs: Automatic opening or closing of a program, abrupt
                     restarting of a computer and opening of strange or unknown windows during the process of
                     booting.
                 ·   Unusual Network Activity: Unusual network activity such as excessive transfer of data even
                     when all the applications are closed.


                      DoS (Denial of Service) Attack

                 Denial of Service (DoS) attack aims at shutting down a network or service, causing it to be inaccessible
                 to its intended users. The attacks accomplish this mission by flooding the target with traffic or more
                 requests than they can handle or flooding it with information that triggers a crash. DoS attack is
                 launched  from a large number  of other  host  machines  that  are infected  by  malicious  software

                 controlled by the attacker.

                      Man in the Middle Attack (MitM)

                 MitM  attack is also known as eavesdropping  attack.  It occurs  when  attackers  interfere in a
                 communication between two-parties, i.e., client and server. Once the attackers interrupt the traffic,
                 they can filter and steal data. The common entry points for MitM attack are:











                                                                                                   Cyber Security  51
   48   49   50   51   52   53   54   55   56   57   58