Page 24 - 2619_PlusGPT V2.1_C-8
P. 24

When a program  runs repeatedly, program viruses are deliberately loaded in a program by the
                  developer. A program file infecting virus is also known as a ‘File Injector’. Sunday and Cascade are the
                  common examples of program viruses.


                       Spam

                  Spam refers to an unwanted and unsolicited message which is received in the inbox of a person’s
                  e-mail account or in newsgroups. The one who sends the spams is called a ‘Spammer’. Generally,
                  spams are sent with an intention to advertise products and services.


                       Symptoms of a Malware and Virus Infection

                  When virus infects human beings; it damages the body which is evident through certain symptoms.
                  In a similar manner, there are certain symptoms that hint that a computer has been infected by
                  malware and virus, like:
                  ·  Slowdown: Fall in speed of processing of computer.

                  ·  Pop-ups: Appearance of unexpected pop-ups on the system.
                  ·  Crash: Frequent crashing of system or BSOD (Blue Screen of Death).

                  ·  Running Out of Storage Space: Occupying huge space of storage.
                  ·  Loss of File: Abrupt deletion of files of a computer system.

                  ·  Unusual activity of messages or programs: Automatic opening or closing of a program, abrupt
                    restarting of a computer and opening of strange or unknown windows during the process of
                    booting.
                  ·  Unusual Network Activity: Unusual network activity such as excessive transfer of data even when
                    all the applications are closed.


                       DoS (Denial of Service) Attack

                  Denial of Service (DoS) attack aims at shutting down a network or service, causing it to be inaccessible
                  to its intended users. The attacks accomplish this mission by flooding the target with traffic or more
                  requests than they can handle or flooding it with information that triggers a crash. DoS attack is

                  launched  from a large number  of other  host  machines  that  are infected  by  malicious  software
                  controlled by the attacker.

                       Man in the Middle (MitM) Attack

                  MitM attack is  also  known as  eavesdropping  attack.  It occurs  when attackers  interfere  in a
                  communication between two-parties, i.e., client and server. Once the attackers interrupt the traffic,
                  they can filter and steal data.











                  22    Premium Edition-VIII
   19   20   21   22   23   24   25   26   27   28   29