Cyber Security SEMINAR
Cyber Security SEMINAR
VIRUS
WORMS
TROJANS HORSE
BACK DOORS
BOTS
VIRUS
WORMS
It works same as a computer virus but it can spread into other systems in the network by
exploiting the vulnerabilities automatically.
TROJAN HORSE
It appears to be a normal application, but when opened/executed some malicious code will
run in background These are generally spread by some form of social engineering
BACKDOORS
Backdoor is a method of bypassing normal authentication process
The backdoor is written by the programmer who creates the code for
the program.
It is often only known by the programmer.
BOTS
Bot is an automated process that interacts with other network services
Can be classified into Spyware.
Used to gather information of user without their knowledge
Ex: Keyloggers Adware Mainly used for promotions of products
Not so harmful
REFERENCES
http://phpsecurity.readthedocs.org/en/latest/Injection-Attacks.html
http://resources.infosecinstitute.com/file-inclusion-attacks/
https://www.incapsula.com/ddos/ddos-attacks/denial-of-service.html
http://searchsecurity.techtarget.com/definition/buffer-overflow
http://ccm.net/contents/31-url-manipulation-attacks
http://searchsecurity.techtarget.com/definition/social-engineering
https://www.blackhat.com/presentations/bh-asia-02/bh-asia-02-shah.pdf
http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html
THANK YOU…..!