Page 53 - PlusGPT_V2.1_C8_Flipbook
P. 53
When a program runs repeatedly, program viruses are deliberately loaded in a program by the
developer. A program file infecting virus is also known as a ‘File Injector’. Sunday and Cascade are the
common examples of program viruses.
Spam
Spam refers to an unwanted and unsolicited message which is received in the inbox of a person’s
e-mail account or in newsgroups. The one who sends the spams is called a ‘Spammer’. Generally,
spams are sent with an intention to advertise products and services.
Symptoms of a Malware and Virus Infection
When virus infects human beings; it damages the body which is evident through certain symptoms.
In the similar manner, there are certain symptoms that hint that a computer has been infected by
malware and virus, like:
· Slowdown: Fall in speed of processing of computer.
· Pop-ups: Appearance of unexpected pop-ups on the system.
· Crash: Frequent crashing of system or BSOD (Blue Screen of Death).
· Running Out of Storage Space: Occupying huge space of storage.
· Loss of File: Abrupt deletion of files of a computer system.
· Unusual activity of messages or programs: Automatic opening or closing of a program, abrupt
restarting of a computer and opening of strange or unknown windows during the process of
booting.
· Unusual Network Activity: Unusual network activity such as excessive transfer of data even
when all the applications are closed.
DoS (Denial of Service) Attack
Denial of Service (DoS) attack aims at shutting down a network or service, causing it to be inaccessible
to its intended users. The attacks accomplish this mission by flooding the target with traffic or more
requests than they can handle or flooding it with information that triggers a crash. DoS attack is
launched from a large number of other host machines that are infected by malicious software
controlled by the attacker.
Man in the Middle Attack (MitM)
MitM attack is also known as eavesdropping attack. It occurs when attackers interfere in a
communication between two-parties, i.e., client and server. Once the attackers interrupt the traffic,
they can filter and steal data. The common entry points for MitM attack are:
Cyber Security 51

