Page 392 - IT 402 v2.0 class 10
P. 392
Crash: Fre uent crashing of system or SO lue Screen of eath .
Running Out of Storage Space: Occupying huge space of storage.
Loss of File: brupt deletion of files of a computer system.
Unusual activity of messages or programs: Automatic opening or closing of a program, abrupt
restarting of a computer and opening of strange or unknown windows during the process of booting.
Unusual Network Activity: Unusual network activity such as excessive transfer of data even when all the
applications are closed.
DoS (Denial of Service) Attack
enial of Service oS attack aims to shut down a network or service making it inaccessible to its intended
users. he attacks accomplish this mission by flooding the target with tra c or more re uests than they
can handle or information that triggers a crash. oS attack is launched from a large number of other host
machines that are infected by malicious software controlled by the attacker.
Man in the Middle Attack (MitM)
MitM attack is also known as eavesdropping attack. It occurs when attack. It occurs when attackers interfere
in a communication between two-parties i.e. client and server. Once the attackers interrupt the tra c they
can filter and steal data. he common entry points for MitM attack are:
On using unsecure public i-Fi attackers can interrupt between a visitor s device and the network. ithout
knowing, the visitor passes all information through the attacker.
Once malware has breached a device, an attacker can install software to process all of the victim’s information.
S oofing
Spoofing is the act of disguising communication from an unknown
source as being from a known and trusted source. Spoofing can
apply to e-mails phone calls and websites. Spoofing can be used
to gain access to a target’s personal information, spread malware
through infected links or attachments, bypass network access
controls or redistribute tra c to conduct a enial of Service oS
attack. Some of the most common spoofing methods are e-mail and
chart spoofing.
390 Touchpad Information Technology-X

