Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Discuss various attacks in computer security.

Various attacks in computer security:


  • Malicious software that can harm your computer.
  • Spreads through unsafe links or email attachments.
  • Examples include spyware, ransomware, viruses, and worms.

Macro Viruses:

  • Infects applications like Microsoft Word or Excel.
  • Attaches to an application’s startup sequence.
  • Replicates itself and spreads to other parts of the system.

File Infectors:

  • Attaches to executable files like .exe files.
  • Installs when the infected code is executed.

System or Boot-Record Infectors:

  • Attaches to the master boot record on hard disks.
  • Activated when the system starts, spreading to other disks.

Stealth Viruses:

  • Conceals themselves by taking over system functions.
  • Compromises malware detection, making it hard to detect.


  • Hides in useful programs but doesn’t self-replicate.
  • Performs malicious functions once activated.

Logic Bombs:

  • Malicious software triggered by specific conditions or dates.
  • Can cause harm when a specific event occurs.


  • Self-contained programs that spread across networks.
  • Propagates without attaching to host files.


  • Installs viruses on computers.
  • Might not be infected itself, making it hard to detect.


  • Blocks access to data and demands payment to restore it.
  • Threatens to publish or delete data if ransom isn’t paid.

Denial of Service (DoS) Attack:

  • Floods systems with traffic to exhaust resources.
  • Prevents the system from fulfilling legitimate requests.
  • Distributed Denial of Service (DDoS) uses multiple compromised devices for the attack.

Leave a Comment