Various attacks in computer security:
Malware:
- Malicious software that can harm your computer.
- Spreads through unsafe links or email attachments.
- Examples include spyware, ransomware, viruses, and worms.
Macro Viruses:
- Infects applications like Microsoft Word or Excel.
- Attaches to an application’s startup sequence.
- Replicates itself and spreads to other parts of the system.
File Infectors:
- Attaches to executable files like .exe files.
- Installs when the infected code is executed.
System or Boot-Record Infectors:
- Attaches to the master boot record on hard disks.
- Activated when the system starts, spreading to other disks.
Stealth Viruses:
- Conceals themselves by taking over system functions.
- Compromises malware detection, making it hard to detect.
Trojans:
- Hides in useful programs but doesn’t self-replicate.
- Performs malicious functions once activated.
Logic Bombs:
- Malicious software triggered by specific conditions or dates.
- Can cause harm when a specific event occurs.
Worms:
- Self-contained programs that spread across networks.
- Propagates without attaching to host files.
Droppers:
- Installs viruses on computers.
- Might not be infected itself, making it hard to detect.
Ransomware:
- Blocks access to data and demands payment to restore it.
- Threatens to publish or delete data if ransom isn’t paid.
Denial of Service (DoS) Attack:
- Floods systems with traffic to exhaust resources.
- Prevents the system from fulfilling legitimate requests.
- Distributed Denial of Service (DDoS) uses multiple compromised devices for the attack.