Explore chapters and articles related to this topic
A systematic classification scheme for cyber-attack taxonomy
Published in Stein Haugen, Anne Barros, Coen van Gulijk, Trond Kongsvik, Jan Erik Vinnem, Safety and Reliability – Safe Societies in a Changing World, 2018
S. Kim, J. Shin, G. Heo, J.G. Song
Foot printing & scanning is the preliminary task of gathering information about the system to be attacked. Password cracking is the attack that extracts passwords through various methods and means, and can gain full access rights to the system through password cracking. Spoofing is the word meaning cheat, which allows spoofing on any connection that exists on the Internet or locally. Sniffing is an act of peeping packets exchanged by other parties on the network, similar to the dictionary meaning of ‘sniff’. Session hijacking is a cyberattack technique that steals and accesses another person’s session state. MITM is the way of intercepting and exchanging information between two parties communicating with each other. A computer virus is a type of malicious software program that can replicate itself by modifying other computer programs and inserting its own code.
Internet Worms
Published in Mohssen Mohammed, Al-Sakib Khan Pathan, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks, 2016
Mohssen Mohammed, Al-Sakib Khan Pathan
A computer worm is a stand-alone malware computer program that replicates itself in order to spread to other computers without requiring any human intervention by sending copies of its code in network packets and ensuring the code is executed by the computers that receive it. Often, worms use a computer network to spread themselves. This is due to security shortcomings on the target computer. Unlike a computer virus, a worm does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. When computers become infected, they spread further copies of the worm and possibly perform other malicious activities [1, 2].
Futures of digital public space
Published in Naomi Jacobs, Rachel Cooper, Living in Digital Worlds, 2018
We can also consider how misadventure or malicious intent might damage such a system. Computer viruses and malware can infect connected computers and be shared via communication methods such as email, and also public shared spaces such as social media. If our ‘minds’, be that our biological brains or simply the digital stores that we choose to use as our memories, can become infected by such viruses, will we find that these might spread and affect our brain? One can also imagine a scenario where a software virus is constructed which removes or adds particular memories to the shared archive, or to individuals (which in some scenarios might be the same thing).
Intelligent predictive stochastic computing for nonlinear differential delay computer virus model
Published in Waves in Random and Complex Media, 2022
Nabeela Anwar, Iftikhar Ahmad, Adiqa Kausar Kiani, Shafaq Naz, Muhammad Shoaib, Muhammad Asif Zahoor Raja
As the popularity of the internet grows, the number of network-based apps also increases in our daily lives which can pose a threat to network users in the same way that malware might [1]. Understanding the mechanism of virus spread is crucial for computer security and defensive measures [2]. Computer viruses are computer programs that have the ability to infect other programs by altering and duplicating them [3]. In general, a computer virus itself is a harmful computer program with the ability to replicate itself in order to target a computer or valuable content; examples of common viruses include Trojans, logic bombs, worms, spyware, logic bombs and so on [4,5]. These apps conduct damaging actions on personal data, such as deleting, changing, manipulating, and encrypting files [4]. One of the most ongoing threats to communication and information equipment is blog scanned worms. One type of worm is the Autorun malware [6]. The Autorun.inf file in the current operating system provides the autoplay functionality. Even without information of the hosted user, all such gadgets have been probably infected and confronted without complexity to certain other systems via removable media or networking equipment [7]. When USB peripherals are linked to the operating system, the autoplay worms enable the operating system to launch an installer via the Autorun.inf file.
A fractional-order model for computer viruses and some solution associated with residual power series method
Published in Applied Mathematics in Science and Engineering, 2023
A. Al-Jarrah, M. Alquran, A. Freihat, S. Al-Omari, K. Nonlaopon
The computer virus is a form of software that can replicate itself and spread to others from one computer. Viruses target the file system primarily, as worms use system weakness to scan and attack machines. However, computer viruses attacks are the major issues of the computer security and knowing their distribution is an essential component of any defensive strategy.