0% found this document useful (0 votes)
20 views6 pages

Cns Assignment (Unit 3)

hii

Uploaded by

bhaydesanika07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views6 pages

Cns Assignment (Unit 3)

hii

Uploaded by

bhaydesanika07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Chapter o3

A) Define Maluane. Eoplaio all hypes th examples.

Ans - MaluDare, short for "malicious Sottare" nefers


to any type of softunre that is desined to
harm expl0it a comter System, etwork
nobile device
Maluore Can take many forms, including vicuses,
worms toans, spywgre adune ransomuYe

Here are Saone malQre


wtt examples

Tucn your P ioto 200obie


Bofhets
Spread across computers Seals your deta
nlormS. Saysare

MaluQre

Trojon s Adware
Soeak molware
iato your PC wthads.
Ransomuare
Rlacknails you
undaram) FOR EDUCATIONAL USE
Cas Botnets
A botnet is a netwcork of
compromised
computers or deices that ane cootrolled etootely
by an attacker.

Example The "Micat" botoet


botr was a netwOrk of
Compromised ToT deuices thcc was used to
lauocb massive. DDoS attacKs in 2016.

(b) Spyware
Spyae is a type of maluare that secretiy
monitors and collectS ioformationabout a User's
Computer activities often fon the purpase of
Gtealioc sensive data

Example The "Coblweb Search" Spyare ws a


malwre ogram that toocked users' browsig
babiits and stole personal dato including login
Crederials and crecdit cand numbers

(c)Aduare
Adusare is a ype of malware thot displays
unwanted aduertisemerts users' comprter
mobile devices.

malwane
Exaople The "Supentish" adu
poam bt was pre- installed on some. LenoVO

laptaps dispkyinq unuanted ads and compmmsing


FOR EDUCATIONAL USE
Sundaram
user secrity.
(d) Ra0somure
RapsOmware is_a type of maone that encrygts
a user's es and demads payment in eXChange
for te decrptioo Key

Example The ransoMware attock


2017 infected over 200, 000 Camputers
wsorlduside demandiog paymet Bitcoio to
restone access to encnypted Liles.

(e) Tajans
A hajan is a type ot malane that disquises
tset aS a legttimate poqram r Hle once
installed a Trajan CAn allo UOarthonized access
to a system netaJOrK.

Example The.
Iojan also KnQun as
Zbt maluare program that stde
honkiog igformeioo aod other senstive data
from ofected Computers.

ype of malcane that can spread


foro Gystem to system Sthot the need for
human iteracion. Worms can eplicate themseves
Cause domage to Systems and netorks

Exornple The Conficker' wrm, also knoso as


dara)
Dounadup" 9 usco a highlyoPEANärm thot spreOd in
2008 by exploing vul nera bj/ties in Windos
opeating systens.
8) Descibe he ditferent types of Ddos Attack

Ans-A Dstibuted DenialL


Denial Of Seríce (oDDS) tack is.
pe ot cyber - cttack ohere attacker
attempts to maKe Compurer on netusork ceSoUrce
unavailable by Llooding tt oHb trafic from
multple SourCeS.
Here are difereot types of DDos attaCks_a

Ca) Volumetic Attacks


These attcks aim toto consume booduoicHh by
sendioga arge amaunt ot trafic toa netumk
or System
he a al is to ouerusbelm the netsork's
baodattt causing becoe unailable

and
DNS anpliication attacks

(b) TCP Storte -


ExhauSion A+tacksa
hese cttackS tuge+ the. Iinotations of a
atusork's System's TCP Connetion table.
The ottocker establishes mcatliple, TCP
conoectiooS ezbaustiog cthe Såstem's resoures
and causing it become unovailable.

Exarmples SYN ood aAck lood and TCP


Connection toodahach
FOR EDUCATIONAL USE
aram)
c) Application- Layer Atacksa
These attacks taget Specic applicatons.
SenviceS a Sucb aS HITP fIP, or SMTP
The goal is to oveTcbelm the application
SerVIce oaking it ioauailabe.

Exomples HTIP flood HIIP POSI Hood


and SMTP Hoocd attacks

(a) Potocol Attacks a


These attacks exploit weakDessio oetork
protocos , uch aS DNS , TP or SSDP.
The oba is to consume netsork resour es_
ausing the system to becorge unavalable.

Exomples DNS ampliticatioo ctacks, NTP


amplcotioos attacks, anod ssDP ampHcaHon
attacks

e) Aopliticoton Attocks
Theseattacks use third- paty seYvices to
anplity the trotfic Sert to vicim's newock
or system.
The Gca! is to iocreaSe the trafic volume
naking moTe ditficult to nanage tigate.
DNS ampfication ttácks , AITP
Examples
and sSDP
LamplficatiooattacksFORyEDäCATIONAL .ampliticaioo
USE attacks.
daram
) fragmectation Attacks e
hese ttackS fovolve sendíog a large amber
of samall paCKets to a netork or System
Ouerwhelming its resonces and causinq to
becone unavalable..

Fxamples fragmertaicn flood attackS


and leardcop attáCks

g) Re£lec-tico Attacks
lhese attacks iovove sendiog traffic to a
thid- party netork or Sstem ohich theo
netlects the traffic back o the vicin's.
netoTK System.

Examples DNS reflec-ioo attacs an


NTP reflecian attacks

(h) Muti- vetor attacks


-bese ottacKS involve using uiple types
of DDoS attackssiouon eOusly making 1t
chalerging to detect and mitigate.
Exanples Combioing Volunestric, TOP state -
exhausion , and application - layer attacks

Sundaram FOR EDUCATIONAL USE

You might also like