Page 356 - Web_Application_v2.0_C12_Fb
P. 356

The  motives behind  such attacks often include:

              Ð ÐFinancial Gain: Obtaining sensitive information like credit card details or login credentials to commit
                 fraud or theft.

              Ð ÐDisruption: Intentionally disrupting business operations or causing widespread chaos.
              Ð ÐEspionage: Stealing confidential data for industrial espionage or compromising national security.

              Common Ways to Spread Malware
              Malware can be spread through several methods, including:

              Ð ÐPhishing Emails: These appear to come from a trusted source but include malicious attachments or links
                 that, once clicked, install malware on the recipient’s device.

              Ð ÐMalicious Websites: Accessing compromised or unsafe websites, or downloading files from such sources,
                 can lead to unintentional malware infections.
              Ð ÐInfected Attachments: Opening email attachments or files from untrusted or unknown sources often
                 introduces malware.

              Ð ÐPhysical Media: Using infected USB drives, CDs, or other removable storage devices can spread malware
                 to connected systems.

                                                  Email Spoofing
                                                  Email  Spoofing  is  a  cybercrime  in  which  attackers  manipulate  the
                                                  sender’s address in an email to make it appear as though it originates
                                                  from a trusted or legitimate source. The primary intent is to deceive the
                                                  recipient and encourage harmful actions, such as:

                                                  Ð Ð Clicking on malicious links:  These  links can  lead  to  malware
                                                     downloads, phishing websites, or theft of personal data.

              Ð ÐOpening  infected attachments:  Attachments  disguised  as  legitimate  files  may  contain  malware  that
                 compromises the recipient’s device.
              Ð ÐRevealing personal information: Victims  may respond to the spoofed email, unknowingly sharing
                 sensitive details like passwords or financial information.

              Ð ÐTaking unauthorised actions: The email might pressure the recipient into transferring funds, granting
                 unauthorized access, or performing other harmful tasks.

              Denial-of-Service (DoS) Attacks
              Denial-of-Service (DoS) Attacks are cyberattacks designed to interrupt
              the normal operation of a website, server, or network by overwhelming
              it  with  excessive  traffic.  This  makes  the  target  system  unavailable  to
              legitimate users.
              Key features of DoS attacks include:

              Ð ÐOverloading  with  Requests:  Attackers  flood  the  system  with  a
                 high volume of requests, such as continuously visiting a webpage
                 or sending large amounts of data packets, consuming all available
                 resources.
              Ð ÐDisruption of Services:  The  system  becomes  unable  to  handle  legitimate  traffic  due  to  resource
                 exhaustion.


                354   Touchpad Web Applications (Ver. 2.0)-XII
   351   352   353   354   355   356   357   358   359   360   361