Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Types of attacks to computer systems  

VICTORIA, CLAUDIA & NATALIA

What are attacks to computer systems?

An organized and intentional attempt that looks for some weakness in the networks or computer systems both in software or hardware, to attack with the aim of damaging it, or obtaining some economic benefit.

What are

attacks to computer systems? 

EXPLOITS

Programs or code sequences -> vulnerabilities -> unforeseen effects.

1. Vulnerabilities: access to hackers.

2. Install malicious -> control the system.

• If there are no vulnerabilities, there is nothing to exploit.

WAYS

WAYS

Hackers can launch an exploit attack in a variety of ways:

  • Website/ advertisement/ emails...

  • Sequence of code -> looking for a vulnerability. Not interaction with a user.

-> discover

o user's operating system

o applications are running

TYPES

TYPES

  • REMOTE EXPLOIT:

No prior access to the

system it attacks.

  • LOCAL EXPLOIT:

Require prior access.

  • CLIENTSIDE EXPLOIT:

Requires user action.

Zero day exploits -> unknown until the time of the attack.

Known exploits -> have already been discovered.

RECOGNIZE - PREVENT

RECOGNIZE PREVENT

How to recognize an exploit attack :

- No typical signs that allow attacks to be recognized.

- Signs -> infection installed

To prevent hackers from using an exploit: software up to date.

DoS and DDoS

DoS y DDoS

Denial of Service Attacks (DoS and DDoS)

Paralyzing the system.

Purpose: disabling the victim's equipment or network indefinite period

- overload or saturation.

- Company´s servers.

Web servers - > certain number of simultaneous user requests or connections

TYPES

TYPES

Two techniques

difference -> number of computers or IPs.

  • DoS "Denial of Service": one machine or IP address: Consuming resources offered by the service

  • DDoS "Destributed Denial of Service": used a large number of computers or IP addresses.

Same time and same service -> difficult to detect

BOTS OR ZOMBIES

BOTS OR ZOMBIES

The computers

-> becoming bots or zombies

-> controlled by a cybercriminal.

Avoid this

  • Configuration of our

routers.

  • Our Internet Service

Provider makes

sure that our router is

up to date with this

configuration.

  • Organizations and companies that provide these services

-> protect network and infrastructure

-> avoid these attacks.

MALWARE

- Is an intrusive software designed to cause damage to computer equipment and systems.

- Includes: viruses, spyware, adware, ransomware, and other types of malicious software.

- It can enter a network through phishing, malicious attachments, malicious downloads, social engineering, or flash drives.

VIRUSES

- Software that alters the funtion of any device, without the user’s permission to achieve malicious purposes.

- It is inserted into an application and runs when it is opened (it can steal confidential data).

- It spreads through infected websites, file transfers or downloads of email attachments, it will remain inactive until the infected file or program is activated.

STUXNET

EXAMPLE

- Appeared in 2010

- Is believed to have been used by the U.S. and Israeli governments to disrupt Iran’s nuclear program.

- It infected more than 20,000 equipment and ruined a fifth of Iran’s nuclear centrifuges, which delayed its program for several years.

TROJANS

- Reads passwords, records what you type on the keyboard or allows the entry of more malware that could even take de computer hostage.

- These actions include: deletion, blocking, copying and modification of data.

- They masquerade as files, with the goal of tricking people into clicking, opening, or installing them.

ADWARE

- Type of software that hijacks the browser or other parts of the system in order to flood it with unwanted advertisements.

- Purpose: generate earnings every time one of the shown ads is clicked. It is also spread by downloading “free” applications.

- It can present ads influenced to our interests, it can also sell browsing data to others.

RANSOMWARE

RANSOMWARE

- It infects the operating

system by preventing

access to certain parts,

folders or files and asks for

a ransom in exchange for

removing this restriction.

- It is spread by sending malicious emails, so that victims open an infected file or click on a link that takes them to the attacker’s website, where they get infected.

SPYWARE

- It collects financial information.

- Some strains of spyware are also capable of activating cameras and microphones to see and hear you without your knowledge.

- It may have some valid uses, such as in companies, acquiring a security policy that allows the software to be used to monitor the use that employees make of computers and mobile devices.

ROOTKIT

- Collection of software,

usually malicious.

- They are the most difficult

to detect and remove, can

hide your presence.

- They dig deep into the computer and perform various illegal activities: stealing user information, sending unwanted email or engaging in DDOS attacks.

KEYLOGGERS

KEYLOGERS

- They are used to capture information that is later sent to others for criminal exploitation.

- They track and record every keystroke on a computer, often without the user's permission or knowledge.

There are two main types of keyloggers: software and hardware.

Hardware keyloggers require actual physical access to a device.

Software keyloggers infiltrates the device via malicious links or attachments.

BACKDOORS

- "The secret entrance

to your devices".

Did you know that

your computer may

have hidden access?

- Consisting is a special sequence within the programming code, whereby you can bypass the security systems of the algorithm to access the system, the device and all its information, files and data saved in it.

WORMS

- Independent program that replicates to infect.

- No need anyone´s action.

- Vulnerabilities

- Execute a paylot -> code:

  • delete files.
  • encrypt data.
  • steal informetion.

SQL Slammer

EXAMPLE

- IP addresses that were sent to search for those who were not protected by antivirus software.

- Apeared in 2003 -> it infected more than 75,000 computers that were involved in DDoS attacks.

- It resurfaced in 2016 and 2017.

PASSWORD

wA//orQuitA´23_

Learn more about creating dynamic, engaging presentations with Prezi