Cns Assignment (Unit 3)
Cns Assignment (Unit 3)
MaluQre
Trojon s Adware
Soeak molware
iato your PC wthads.
Ransomuare
Rlacknails you
undaram) FOR EDUCATIONAL USE
Cas Botnets
A botnet is a netwcork of
compromised
computers or deices that ane cootrolled etootely
by an attacker.
(b) Spyware
Spyae is a type of maluare that secretiy
monitors and collectS ioformationabout a User's
Computer activities often fon the purpase of
Gtealioc sensive data
(c)Aduare
Adusare is a ype of malware thot displays
unwanted aduertisemerts users' comprter
mobile devices.
malwane
Exaople The "Supentish" adu
poam bt was pre- installed on some. LenoVO
(e) Tajans
A hajan is a type ot malane that disquises
tset aS a legttimate poqram r Hle once
installed a Trajan CAn allo UOarthonized access
to a system netaJOrK.
Example The.
Iojan also KnQun as
Zbt maluare program that stde
honkiog igformeioo aod other senstive data
from ofected Computers.
and
DNS anpliication attacks
e) Aopliticoton Attocks
Theseattacks use third- paty seYvices to
anplity the trotfic Sert to vicim's newock
or system.
The Gca! is to iocreaSe the trafic volume
naking moTe ditficult to nanage tigate.
DNS ampfication ttácks , AITP
Examples
and sSDP
LamplficatiooattacksFORyEDäCATIONAL .ampliticaioo
USE attacks.
daram
) fragmectation Attacks e
hese ttackS fovolve sendíog a large amber
of samall paCKets to a netork or System
Ouerwhelming its resonces and causinq to
becone unavalable..
g) Re£lec-tico Attacks
lhese attacks iovove sendiog traffic to a
thid- party netork or Sstem ohich theo
netlects the traffic back o the vicin's.
netoTK System.