Page 392 - IT 402 v2.0 class 10
P. 392

  Crash: Fre uent crashing of system or  SO    lue Screen of  eath .

          Running Out of Storage Space: Occupying huge space of storage.
          Loss of File:  brupt deletion of files of a computer system.
          Unusual activity of messages or programs:  Automatic opening or closing of a program,  abrupt
           restarting of a computer and opening of strange or unknown windows during the process of booting.
          Unusual Network Activity: Unusual network activity such as excessive transfer of data even when all the
           applications are closed.

        DoS (Denial of Service) Attack

         enial of Service   oS  attack aims to shut down a network or service  making it inaccessible to its intended
        users.  he attacks accomplish this mission by flooding the target with tra c or more re uests than they
        can handle or information that triggers a crash.  oS attack is launched from a large number of other host
        machines that are infected by malicious software controlled by the attacker.

        Man in the Middle Attack (MitM)
        MitM attack is also known as eavesdropping attack. It occurs when attack. It occurs when attackers interfere
        in a communication between two-parties  i.e.  client and server. Once the attackers interrupt the tra c  they
        can filter and steal data.  he common entry points for MitM attack are:























        On using unsecure public  i-Fi  attackers can interrupt between a visitor s device and the network.  ithout
        knowing, the visitor passes all information through the attacker.

        Once malware has breached a device, an attacker can install software to process all of the victim’s information.
        S oofing

        Spoofing is the act of disguising  communication from an unknown
        source  as  being  from  a  known  and  trusted  source.  Spoofing  can
        apply to e-mails  phone calls  and websites. Spoofing can be used
        to gain access to a target’s personal information, spread malware
        through  infected  links or  attachments,  bypass network  access
        controls  or redistribute tra c to conduct a  enial of Service   oS
        attack. Some of the most common spoofing methods are e-mail and
        chart spoofing.






         390       Touchpad Information Technology-X
   387   388   389   390   391   392   393   394   395   396   397