Submitted by: Firstname Lastname Course Prefix and Number Semester and Year Assi
ID: 3748686 • Letter: S
Question
Submitted by: Firstname Lastname Course Prefix and Number Semester and Year Assignment # Title for Your Work Introduction Write at least a few lines of about the work/topic here. Sub heading for each of the Sub Topics Write and explain, if necessary, each of the subtopics here. Be as technical as possible wherever needed. Results Add any tables or screenshots that you took showing the work you did. All the tables and figures or screenshots must accompany a title and explanation. Discussion and Conclusion Based on your understanding of the material you gathered (results), explain the significance of the technology here. Bibliography Details of any material you referred for this work such as textbook, magazines, journal articles, online sites, etc NOTE: 1. The max number of pages is around 10. Though there is no minimum number of pages, always make sure you cover the content fully with as many relevant subtopics as possible 2. 3. Use pictures if needed, but do not make up pages with pictures 4. Make sure you have at least 2 or 3 sub topics . After finishing the work a. b. save the document with a proper filename submit it via email i. as an attachment, along with Course number, title and Assignment# on the subject line of the email. ii,Explanation / Answer
SOLUTION:
This solution having explanation,example and detailed about threats and attacks for your clear and better understanding.
Explanation :
A threat is defined as :
anything that can cause an unwanted impact on our pc via any hacking attacks.
whenever a threat occurs then system stops its proper functionalities.
And hackers gets information of a system via this hacking attacks.
Now in digital day threats are becoming in more increasable form.
So in computer security threats can be of following types:
1. Virus
2. Malware
3.a computer worm
4. backdoor
5.spyware
1.virus : It is a malicius program that is spread from one system to another system via internet or network.
it is a malicious executable code/file which harm the computer and stops working properly.
It infects the file system and itself replicates.
2. malware : malware is made up of two words. malicious + software. i.e mal+ware=malware
so malware is a software that harm the computer system and gain authroised access of computer.
malware is specially designed to damage or harm the computer system without any consent of owner.
3. a computer worm: It is a self replicating program that harm the owner pc
as well as it spread from one pc to other via network.
It always harm the network because it spread over the network.
Now let's see about attacks:
Atacks is defined as :
An attacks is nothing but a security threats whose main intention is to gain any kind of information of users,
take unauthroised access to other computer without any user permission.And destroy or alter the user information/data
whenever there is vulnerabilities in your computer system then hackers takes advantages of this and do some kind attacks.
now let's see the dfifferent kind of attacks in cyber system:
1. Phishing
2. Denial of Service
3. SQL Injection Attack
4. Man-in-the-Middle Attacks
Nnow let's see about atlear two of above them.
1. phising attacks: In phising attacks,A hacker sends an email with attachment of malicious
executable program file and whenver a user clicks
that attachment then it gain access to your system and then
malware install in your system . then after that your all detail goes to hacker
from personal to other login details.
so before going to clicks any link , first confirm the attachment and email sender to
be safe.
2. Denial of services : it is a some kind of malicious program that main intention is to prevent the services.
This type of attacks includes extra traffics for any sites so that user can't get resources from them.
i.e to deny the sevices.
Hackers do this type of attacks for their need.
so best way to stop this kind of attacks is to disconnect the host from internet.
hence after going through these two term threats and attacks,
we have concluded that attacks is done after threats.
so use antivirus as far as possible.
since everyting is provided for better and clear understanding .
However further if any difficulty in understanding the above then feel
free to ask.