Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Types Of Attacks

No description
by

allie hearne

on 31 July 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Types Of Attacks

Sources
http://www.infoworld.com/article/2616316/security/the-5-cyber-attacks-you-re-most-likely-to-face.html
http://www.personal.psu.edu/users/j/m/jms6423/Engproj/Types%20of%20Attacks.xhtml
https://en.wikipedia.org/wiki/Computer_worm
Viruses
Similar to viruses in bodies, a cybyer virus infects the computer, making copies of itself and harming the computer.

Unlike worms. viruses survive by attaching itself to other files and programs.
What are cyber attacks?
Cyber attacks are when hackers attempt to create havoc and destroy computer networks or systems.

There are many different types of cyber attacks. In this presentation, ill focus on 3 in particular; phishing, worms, and viruses
Worms
A computer worm is a malware computer program that replicates itself in order to spread to other computers

Usually, the malware targets security fails and uses computer networks to do this. The malware does not need an existing program to attach to.
Phishing
Like actual fishing, hackers will reel you in with their fantastic and "real" offers! Unfortunetly they are scams that want personal information like your credit card or your password to online banks.

Types Of Attacks
Allie Hearne
Full transcript