Wednesday, February 29, 2012

Definition of Terms

1. What is a VIRUS


"It is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission." (Discovering Computers 2007: A Gateway to Information)


"A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk." (http://support.microsoft.com/kb/129972)


A virus is also called a disease of a computer. 


What is the cause of Computer Viruses?


Computer Viruses are caused by attaching some files or messages in emails or instant messaging. When the receiver of the file obtains that kind of file, and does not recognize the name of the sender, there is a possibility that the user's computer will have the virus if he/she entertains it. While, the receiver accepts the file and also not familiar with and immediately deletes it, his or her desktop will be free from the virus.




2. What is a WORM


A type of a program which copies itself frequently which uses a computer network to send copies to other nodes. 


"Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer." (Tiernan, Ray)


A worm also has the capability to travel without any human action, unlike the virus. Due to the copying nature of worm and its capability on travelling across the networks, it will lead to too much system memory causing Web servers, network servers and individuals computer to impede responding.


3. What is a TROJAN HORSE?


This was originally came from Greek myth which is all about the Trojan war by hiding, in a huge hollow wooden horse to sneak into the fortified city of Troy. 


In today's generation of computer, TROJAN HORSE is defined as a malicious, security breaking program that is disguised as something benign. It is also a program that hides within or looks like a legitimate program. Unlike virus and worm, Trojan horse does not replicates itself to other computers. 






4. What is a PAYLOAD


"In the analysis of malicious software such as worms, viruses and Trojans, it refers to the software's harmful results. Examples of payloads include data destruction, messages with insulting text or spurious e-mail messages sent to a large number of people." (http://computer.yourdictionary.com/payload)


5. What is a HONEYPOT?


It is a vulnerable computer that is set-up to entice an intruder to break into.Honeypots allow the company or organization to learn how intruders are exploiting their network and also attempt to catch perpetrators who have been doing damage elsewhere on their network.
AT&T and YAHOO are some of the Web hosting companies
which frequently uses honeypots.


6. What is a BOTNETS?


A botnet refers to a type of bot running on an IRC network that has been created with a Trojan. When an infected computer is on the Internet the bot can then start up an IRC client and connect to an IRC server. The Trojan will also have been coded to make the bot join a certain chat room once it has connected. Multiple bots can then join in one channels and the person who has made them can now spam IRC chat rooms, launch huge numbers of Denial of Service attacks against the IRC servers causing them to go down.






7. What is SPOOFING?


It is a kind of a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. This was also a creation of TCP/IP packets using somebody else's IP address. 
There is a common misconception, and that is what we call, "IP spoofing". This is used to hide your "IP address while surfing the net, chatting on-line and even sending e-mail. However, IP spoofing is an integral part of many network attacks that do not need to see responses (BLIND SPOOFING).


Examples of Spoofing:
a. man-in-the-middle
             packet sniffs on link between the two end points, and can therefore pretend to be one end of the connection



* routing redirect




           redirects routing information from the original host to the hacker's host (this is another form of man-in-the-middle attack).




b. source routing




        redirects individual packets by hackers host



c. blind spoofing




        predicts responses from a host, allowing commands to be sent, but can't get immediate feedback.





d.flooding




       SYN flood fills up receive queue from random source addresses; smurf/fraggle spoofs victims address, causing everyong respond to the victim.





8. What is DENIAL OF SERVICE ATTACKS?




DoS attack, is a an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. For example, they may use an unsuspecting computer to send an influx of confusing data messages or useless traffic to a computer network. The victim computer network eventually jams, blocking, legitimate visitors from accessing the network.
















One type of Denial of Service Attacks is, DDoS (distributed DoS) attack, in which multiple unsuspecting computers are used to attack multiple computer networks. It has been able to stop operations temporarily at numerous Web sites (Yahoo,Amazon.com,eBay and CNN.com). 





9. What are BACK DOORS?



A type of program that allow users to bypass security controls when accessing a program, computer, or network. Often install a back door or modify an existing program to include a back door, which allows them to continue access the computer remotely without the user's knowledge. 






"Also called a trapdoor. An undocumented way of gaining access to a program, online service or an entire computer system." (http://www.webopedia.com/TERM/B/backdoor.html)





10. What is a FIREWALL?




"It is a hardware or software that protects a network's resources from intrusion by users on another network such as the Internet.All networked and online computer users should implement a FIREWALL solution." (Shelly, Cashman and Vermaat)







Companies use firewalls to protect network resources from outsiders and to restrict employees' acess to sensitive data such as payroll or personnel records.







REFERENCES:








Discovering Computer 2007: A Gateway to information







by:Shelly, Cashman and Vermaat







http://www.webopedia.com/TERM/B/backdoor.html







http://computer.yourdictionary.com/payload







http://support.microsoft.com/kb/129972