System Based Attacks These are the attacks which are intended to compromise a computer or a computer network. Some of the important system- based attacks are as follows-
University of Education, Lahore
System Based Attacks 1. Virus: It is a type of malicious software program that spread throughout the computer files without the knowledge of a user. It is a self-replicating malicious computer program that replicates by inserting copies of itself into other computer programs when executed. It can also execute instructions that cause harm to the system.
University of Education, Lahore
System Based Attacks 2. Worm: It is a type of malware whose primary function is to replicate itself to spread to uninfected computers. It works same as the computer virus. Worms often originate from email attachments that appear to be from trusted senders.
University of Education, Lahore
System Based Attacks 3. Trojan horse: It is a malicious program that occurs unexpected changes to computer setting and unusual activity, even when the computer should be idle. It misleads the user of its true intent. It appears to be a normal application but when opened/executed some malicious code will run in the background.
University of Education, Lahore
System Based Attacks 4. Backdoors: It is a method that bypasses the normal authentication process. A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes.
University of Education, Lahore
System Based Attacks 5. Bots: A bot (short for "robot") is an automated process that interacts with other network services. Some bots program run automatically, while others only execute commands when they receive specific input. Common examples of bots program are the crawler, chatroom bots, and malicious bots.
University of Education, Lahore
Layers of Cyber Security The 7 layers of cyber security should center on the mission critical assets you are seeking to protect.
University of Education, Lahore
Layers of Cyber Security 1: Mission Critical Assets – This is the data you need to protect.
2: Data Security – Data security controls protect the storage and
to an application, an application’s access to your mission critical assets, and the internal security of the application.
4: Endpoint Security – Endpoint security controls protect the
connection between devices and the network.
University of Education, Lahore
Layers of Cyber Security 5: Network Security – Network security controls protect an organization’s network and prevent unauthorized access of the network.
6: Perimeter Security – Perimeter security controls include both the
physical and digital security methodologies that protect the business overall.
University of Education, Lahore
Layers of Cyber Security 7: The Human Layer – Humans are the weakest link in any cyber security posture. Human security controls include phishing simulations and access management controls that protect mission critical assets from a wide variety of human threats, including cyber criminals, malicious insiders, and negligent users.
Learn Penetration Testing with Python 3.x: Perform Offensive Pentesting and Prepare Red Teaming to Prevent Network Attacks and Web Vulnerabilities (English Edition)