View Discussion Improve Article Save Article Like Article View Discussion Improve Article Save Article Like Article Prerequisite – Basic Network Attacks, Types of Viruses The security of a computer system is a crucial task. It is a process of ensuring the confidentiality and integrity of the OS. Security is one of most important as well as the major task in order to keep all the threats or other malicious tasks or attacks or program away from the computer’s software system. A system is said to be secure if its resources are used and accessed as intended under all the circumstances, but no system can guarantee absolute security from several of various malicious threats and unauthorized access. The security of a system can be threatened via two violations:
Security violations affecting the system can be categorized as malicious and accidental threats. Malicious threats, as the name suggests are a kind of harmful computer code or web script designed to create system vulnerabilities leading to back doors and security breaches. Accidental Threats, on the other hand, are comparatively easier to be protected against. Example: Denial of Service DDoS attack. Security can be compromised via any of the breaches mentioned:
Security System Goal:
Threats can be classified into the following two categories:
Types of Program Threats:
Types of System Threats – 1. Worm: The basic functionality of the worm can be represented as: 2. Port Scanning: 3. Denial of Service: Such attacks aren’t aimed for the purpose of collecting information or destroying system files. Rather, they are used for disrupting the legitimate use of a system or facility. These attacks are generally network-based. They fall into two categories: – Attacks in this first category use so many system resources that no useful work can be performed. For example, downloading a file from a website that proceeds to use all available CPU time. – Attacks in the second category involve disrupting the network of the facility. These attacks are a result of the abuse of some fundamental TCP/IP principles. the fundamental functionality of TCP/IP. Security Measures Taken –
Usually, Anti Malware programs are used to periodically detect and remove such viruses and threats. Additionally, to protect the system from Network Threats, a Firewall is also be used. |