Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security Risks (Adware (Adware can be installed without the users…
Security Risks
-
DOS Attacks
A Denial of Service (DOS) attack is where a server's functionality is taken away by an attacker flooding the server with requests
They can also be a Distributed Denial of Service (DDOS) where an attacker can use multiple computers, using malware, to flood an even larger server
Effects of a DOS attack
-
- Inability to access functions
-
-
- Loss of faith in affected organisation
-
Types of DOS attack
Bandwidth consumption
-
These cause a overload of network traffic. causing the server to be unable to send or receive data packets
Resource starvation
-
An example of one of these attacks would be repeated requests to the same processor that causes it to repeat the same task, stopping it from performing other tasks
A method of starving memory resources would be to flood a system with data
i.e. coding a program that fills a basket of an online shop with thousands of items, to use up the available memory
i.e. coding a program that will make thousands of requests for accounts to be made on a server. each account would add to demands on backing storage
Routing
-
-
Routing can also employ the use of a dummy system that pretends to be legitimate so that the data that's rerouted to it can be stolen or monitored
-
A routing attack becomes a denial of service when the system or network is unable to receive data because it's been routed to a different location
-
Reasons for a DOS attack
DOS attacks could be mounted for a variety of reasons, such as:
-
-
-
-
-
-
- Issues of international security
Tracking Cookies
They are text files that are stored on the users computer (to improve loading times and take off the work load on servers)
-
Benefits of cookies
- Remember user preferences
- Usernames for faster logins
-
Trojans
A form of software that presents itself as a helpful program but, when run, turns out to be malicious
Some functions include allowing attackers to monitor your activities or give themselves access to your computer
Trojans can be hidden as a number of things, such as:
-
-
-