logo

Computer Security

   

Added on  2022-12-15

5 Pages798 Words352 Views
Running head: COMPUTER SECURITY
COMPUTER SECURITY
Name of the Student
Name of the University
Author Note

COMPUTER SECURITY 1
Question 1:
The toolkits of web-attack are a type of software program which is designed and coded to
analyse the target’s computing appliances in the interest to find out the security
vulnerabilities and potholes automatically so that the hacker gets a path to gain access of
the target’s machine. Depending upon the working principle, design structure web-attacks
could be categorized into some types-
FormJacking: The attacker uses malicious code of JavaScript, in the aim of obtain
credit card details and other payment related information from eCommerce sites.
CryptoJacking: The criminals run a code for mining cryptocurrency without the
acknowledgement of the victims.
Ransomware: The hacker uses a malware derived from cryptovirology, which
threaten the target about his personal data to publish, or can block the victim from
accessing his machine. There are several types of ransomware, like- WannaCry,
CopyCat, Petya, Ryuk, and Crysis.
For the leaps and bounce increase of internet dependency and incident of hacking
happened in this scope on last few years gives a clear image about the importance of
computer security now-a-day. In 2018, at least 1 out of 10 URLs was reported as
malicious, the web attacks were also 56percent extra than the last year where it was 1 out
of 16. On December, 18 Symantec reported a blocking of 1.3 million web attacks, per-
day. FormJacking started effecting about 4800 websites on every month of 2018 and 3.7
million FormJacking was blocked by Symantec this year, among which about 30percent
happened in the last quarter (Symantec.com. 2019). The nature of IoTs and internet
objects of being prone to this web-attacks and the huge loss of identity and information
reported, explains the importance of computer security precisely with evidence.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information System Security and Risk Management
|15
|3898
|364

Security Concerns of Ransomware
|13
|2895
|140

Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management
|10
|3587
|73

Assignment on Ransomware and Cyber Security
|3
|419
|62

This vulnerability allows the attackers
|21
|1135
|15

ITC595 - Information Security
|3
|3044
|93