Discussion 3

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Technological Institute of the Philippines

938 Aurora Blvd. Cubao, Quezon City

College of Computer Studies

CS 004 – NETWORKS AND COMMUNICATIONS

FinalPeriod
NETWORKS AND COMMUNICATIONS

Name: Mata Francis Joy M. Date: 11/07/2023


Program / Section: CS31S3 Instructor: Ma’am Karren
Discussion 3 - Network Security

1. Computer Virus
- A computer virus is a type of malicious software that attaches itself
to other executable files or documents in order to multiply and
spread. Once launched, it can corrupt files, pilfer information, or
interfere with regular system operations.
2. Trojan horse
- Malware that poses as trustworthy software to trick users into
installing it is known as a Trojan horse. Trojans, in contrast to
viruses, cannot multiply but can open backdoors to allow unwanted
access, which can result in system compromise or data theft.
3. Botnets
- Networks of compromised computers, or "bots," that are managed
remotely by a central server are called botnets. Botnets are utilized
by cybercriminals for a range of nefarious purposes, including
coordinated assaults, spam distribution, and distributed denial-of-
service (DDoS) operations.
4. Worm
- A worm is a type of malware that replicates on its own and spreads
without attaching itself to host files. Worms can spread quickly by
taking advantage of holes in computer networks, which can lead to
extensive harm and an overabundance of network resources.
5. Spoofing
- Spoofing is the process of masking data or communication to make
it seem as though it originates from a reliable source. This dishonest
tactic is frequently employed in phishing attacks or to obtain illegal
access to networks by impersonating a trustworthy person or
gadget.
6. Smurfing
- Smurfing is a kind of cyberattack in which a huge number of Internet
Control Message Protocol (ICMP) packets are sent via a victim's
network, usually by means of IP spoofing. The target's network may
become overloaded with an influx of requests, disrupting services.
7. Phishing
- Phishing is a type of social engineering assault in which hackers use
false emails, messages, or websites to mislead people into divulging
personal information, such bank account information or login
passwords.
8. Pharming
- Pharming is a type of cyberattack when a website's traffic is secretly
diverted to a counterfeit website. Because of this, people may
provide private information on malicious websites under the
mistaken impression that they are communicating with a trustworthy
organization.
9. Rootkit
- A rootkit is a collection of software tools intended to hide dangerous
programs or activity from view on a system. In order to escape
discovery, rootkits might alter a system's operation and frequently
allow illegal access.
10. Keylogger
- Malicious software or hardware that secretly records keystrokes on
a computer is known as a keylogger. Keyloggers are tools used by
cybercriminals to steal credit card numbers and other sensitive data
in order to gain illegal access or steal identities.

References:
https://en.wikipedia.org/wiki/Computer_virus
https://www.techtarget.com/searchsecurity/definition/Trojan-horse
https://usa.kaspersky.com/resource-center/threats/botnet-attacks
https://www.techtarget.com/searchsecurity/definition/worm#:~:text=A
%20computer%20worm%20is%20a,to%20spread%20to%20uninfected
%20computers.
https://www.forcepoint.com/cyber-edu/spoofing
https://usa.kaspersky.com/resource-center/definitions/what-is-a-smurf-attack
https://en.wikipedia.org/wiki/ILOVEYOU
https://www.kaspersky.com/resource-center/definitions/pharming
https://www.malwarebytes.com/rootkit
https://www.malwarebytes.com/keylogger

You might also like