Thursday, 24 October 2013

Cyber Threats

Cyber threats are those related to being connected to the Internet or other networks. These threats consist of many types, but well-known and common online threats are those which take advantage of email and web services.

However, just connecting your computer to the Internet provides a range of other potential ways your computer can be attacked even when you are not using the web (through your web browser) or reading or accessing email.

Types of Internet threats:


Network worms
Spyware / Adware
Other Malware
Other Threats
Viruses, worms & Trojan horses

A virus is a program that replicates itself, usually by attaching itself to other files and program. A worm is a program that does not infect other programs but makes copies of itself. Trojan horse programs do not replicate nor make copies of themselves, but rely on other “manual” method of distribution. We use the term “Virus” on this page to cover all forms of infections.Virus are spread in a variety of ways.

Some Examples:

  • Email attachments (such as klez, Badtrans, myparty)
  • Instant messages links and attachments (such as Aplore)
  • Compromised web services (such as Nimda)
  • Usenet news groups
  • Internet relay Chart channels
  • USB Storage
  • File downloads (many backdoor Trojans are embedded with other files)
All viruses are different. Some activate on a certain day, but remain dormant until then. Others being the attack as soon as the machine has been infected. Viruses can be very damaging and some are just annoying. More than 1,00,000 known viruses exists in the world today several hundred new Viruses are discovered every month.

[This picture shows the statistics of Online Threats in the world: Updated report until 22nd October'13.]

[This picture shows the statistics of Local infections in the world: Updated report until 22nd October'13.]

Protecting from viruses:

A good way to protect yourself is to have virus protection program and keep it up-to-date. Before running a download from an unknown site, or opening an email attachment, always be sure to scan it to ensure that it is not infected. If you do not know that source of a file does not open it. Even it you know the person who sent you a file, if you were not expecting it you may want to contact them before opening it. This is because many viruses automatically send themselves out to addresses it finds in file on the infect computer.

Anti-Virus program:

An anti-virus program designed to protect your computer from possible viruses infection. Most viruses are designed to operate in the background in a that the user will not notice. Virus protection program search for, detect, and attempt to remove these viruses. Anti-virus program must be kept up to date in order for them to provide adequate protection. New viruses are being created every day and your antivirus program can’t always predict what they will be able to do or how they will work. Due to the nature of the operating system, Linux, and other UNIX kinks operating system are not as susceptible to viruses. Thus an anti-virus program is not necessary.

Network Worm:

  1. Self-replicating Viruses that reside in the active memory of a computer.
  2. Worms send themselves out to the Internet from infected system.
  3. Either include tiny e-mail servers or search for unprotected shared network
Trojan Programs:

Programs that installed themselves stealthy via Internet & provide access for malicious use.
  • Threats enabled by (/through) Trojans
  1. DDos attacks(distributed denial-of-service attack)
  2. Data stealing
  3. Distributed spam emails
  4. Do not replicate

Spyware / Adware:

  1. Cookies-Track you online.
  2. Browser Hijackers-Changes default home page.
  3. Tracking Cookies-Gathers info of web usage.
  4. Trickles-Re-installs spyware when detected.
  5. Keyloggers-Records anything you type.

Other Malware:

  1. Dos & DDos attacks
  2. Flooders
  3. FileCryptors & PoluCryptors
  4. Nukers …Etc.

Other Threats:

  1. Phishing
  2. Confidential information stealing by fraud emails & web sites (author falsified)
  3. Several millions of phishingg messages have been sent world wide
  4. Fastes growing threat today:SPIM
  5. Instant message SPAM
Diagnosing (or) Detecting Infections:

  1. Slow computer, System reboots
  2. Mouse moves by itself
  3. Browser goes to unexpected web sites
  4. Slow internet access
  5. Endless popup ads
  6. New desktop toolbars

  1. Disabled antivirus scanner or firewall
  2. Check startup programs groups regulation for software you didn't install
  3. Add/Remove programs for software’s you didn't install (make a list of install items on a new machine and check the list regularly)
  4. Check running services monthly
  5. Check running processes in task manage
  6. Monitor open ports
  7. Monitor outgoing and incoming connections.
Methods against Threats:
  1. Updating
  2. Antivirus software
  3. Antispyware Tools
  4. Firewall

Know about Top 10  Security Vulnerabilities.

Download the PDF file from my Google Drive with following link.

This entry was posted in .


Post a Comment