ASSIGNMENTS

What is Phishing? What are the effects of Phishing?

phishing is a term used to describe a malicious individual or group of individuals who scam users. They do so by sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information. Because these e-mails and web pages look like legitimate companies users trust them and enter their personal information.

Phishing wrecks lives. It also steals identity.Criminal organizations around the world use the technique known as phishing to extract information from innocent citizens in order to access their bank details, steal identities, launder money and more.

Attempts can be difficult to spot with an untrained eye, and successful phishing affects everybody, from the bank manager to small children whose school, club or church group may be caught out by this type of scam.

The effect of phishing on the economy is also powerful – but rarely as long lasting, hard-hitting or just downright embarrassing as when they con you.

http://www.computerhope.com/jargon/p/phishing.htm

http://www.brighthub.com/computing/smb-security/articles/64476.aspx

 

What is a e-mail spam?

Spam can be not only annoying but also dangerous to consumers. What that means for you as an email marketer is that the safety precautions that email service providers have put in place to control the amount of spam that makes it into a user’s inbox may actually work against your perfectly legitimate and requested email to your subscribers. As you expand your email marketing program, you’ll consistently be frustrated by having to fight your way past email spam filters. In this section, we’ll take a closer look at what email spam is so that you understand why those filters are so very important.

Take a moment right now to go to your email inbox. Now, go to your spam or junk folder. Depending on how effective your spam filters are, when the last time you emptied your spam folder was, and who your email service provider is, you may literally have hundreds of unsolicited email messages in your spam box. Of course, chances are that not only your email service provider’s spam filters but also you personally will know that these email messages are junk.

https://emailmarketing.comm100.com/email-marketing-ebook/email-spam.aspx

 

What is a denial-of -attack? How can it be prevent?

A denial of service (DoS) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. In a distributed denial-of-service, large numbers of compromised systems (sometimes called a botnet) attack a single target.

While it may not be possible to fully eradicate the risk of DoS attacks from an enterprise, there are steps that info sec pros can take to prevent them. In this expert response, Mike Chapple gives pointers on how to prevent DoS attacks.

Is it possible to prevent denial-of-service (DoS) attacks from affecting an enterprise network? If so, how can…it be done?

In short: no. There’s no way to completely protect your network from denial-of-service attacks, especially with the prevalence of distributed denial-of-service (DDoS) attacks on the Internet today. It’s extremely difficult to differentiate an attack request from a legitimate request because they often use the same protocols/ports and may resemble each other in content.

However, there are some things you can do to reduce your risk:

  • Purchase a lot of bandwidth. This is not only the easiest solution, but also the most expensive. If you simply have tons of bandwidth, it makes perpetrating aDoS attack much more difficult because it’s more bandwidth that an attacker has to clog.
  • Use DoS attack detection technology. Intrusion prevention system and firewall manufacturers now offer DoS protection technologies that include signature detection and connection verification techniques to limit the success of DoS attacks.
  • Prepare for DoS response. The use of throttling and rate-limiting technologies can reduce the effects of a DoS attack. One such response mode stops all new inbound connections in the event of a DoS attack, allowing established connections and new outbound connections to continue.

http://searchsoftwarequality.techtarget.com/definition/denial-of-service

. http://searchsecurity.techtarget.com/answer/How-to-prevent-a-denial-of-service-DoS-attack

 

What is Rootkit?

Rootkit is an application (or set of applications), that hides its presence or presence of another application (virus, spyware, etc.) on the computer, using some of the lower layers of the operating system (API function redirection, using of undocumented OS functions, etc.), which makes them almost undetectable by common anti-malware software.

Please note that rootkits can be either legitimate or malicious. Correct rootkits may be installed as a part of legitimate application. The list of some well-known rootkits can be found in the Detection of known legitimate rootkits. Because of that it is necessary to pay close attention to the Anti-Rootkit results.

Rootkit can get to a computer using various ways. The most common way is through some trojan horse or some suspicious email attachment. Also surfing the web may result in installation of a rootkit, for example when “special” plugin (pretending to be legitimate) is needed to correctly view some webpage, to launch some file, etc.

https://support.avg.com/SupportArticleView?l=en_US&urlName=What-is-rootkit

 

What is Botnet?

Botnets are networks made up of remote-controlled computers, or “bots.” These computers have been infected with malware that allows them to be remotely controlled. Some botnets consist of hundreds of thousands — or even millions — of computers.

“Bot” is just a short word for “robot.” Like robots, software bots can be either good or evil. The word “bot” doesn’t always mean a bad piece of software, but most people refer to the type of malware when they use this word.

http://www.howtogeek.com/183812/htg-explains-what-is-a-botnet/

 

 

 

 

 

 

 

 

 

 

 

 

Leave a comment