Page 356 - Web_Application_v2.0_C12_Fb
P. 356
The motives behind such attacks often include:
Ð ÐFinancial Gain: Obtaining sensitive information like credit card details or login credentials to commit
fraud or theft.
Ð ÐDisruption: Intentionally disrupting business operations or causing widespread chaos.
Ð ÐEspionage: Stealing confidential data for industrial espionage or compromising national security.
Common Ways to Spread Malware
Malware can be spread through several methods, including:
Ð ÐPhishing Emails: These appear to come from a trusted source but include malicious attachments or links
that, once clicked, install malware on the recipient’s device.
Ð ÐMalicious Websites: Accessing compromised or unsafe websites, or downloading files from such sources,
can lead to unintentional malware infections.
Ð ÐInfected Attachments: Opening email attachments or files from untrusted or unknown sources often
introduces malware.
Ð ÐPhysical Media: Using infected USB drives, CDs, or other removable storage devices can spread malware
to connected systems.
Email Spoofing
Email Spoofing is a cybercrime in which attackers manipulate the
sender’s address in an email to make it appear as though it originates
from a trusted or legitimate source. The primary intent is to deceive the
recipient and encourage harmful actions, such as:
Ð Ð Clicking on malicious links: These links can lead to malware
downloads, phishing websites, or theft of personal data.
Ð ÐOpening infected attachments: Attachments disguised as legitimate files may contain malware that
compromises the recipient’s device.
Ð ÐRevealing personal information: Victims may respond to the spoofed email, unknowingly sharing
sensitive details like passwords or financial information.
Ð ÐTaking unauthorised actions: The email might pressure the recipient into transferring funds, granting
unauthorized access, or performing other harmful tasks.
Denial-of-Service (DoS) Attacks
Denial-of-Service (DoS) Attacks are cyberattacks designed to interrupt
the normal operation of a website, server, or network by overwhelming
it with excessive traffic. This makes the target system unavailable to
legitimate users.
Key features of DoS attacks include:
Ð ÐOverloading with Requests: Attackers flood the system with a
high volume of requests, such as continuously visiting a webpage
or sending large amounts of data packets, consuming all available
resources.
Ð ÐDisruption of Services: The system becomes unable to handle legitimate traffic due to resource
exhaustion.
354 Touchpad Web Applications (Ver. 2.0)-XII

