WAYS USED BY HACKERS TO ATTACK YOUR COMPUTER

By | February 12, 2014

 1.ATTACK:


The attack is of 2 types:

a)Active attack:


             In this attack the cyber criminals can hack your data and then can alter your data

b)Passive attack:
    
             In this attack the cyber criminals can hack your data.

 

2.UNAUTHORIZED ACCESS TO COMPUTER SYSTEM:


 There is possibility that the cyber criminals can use your computer or any other system like mobiles,etc. 

 

3.VIRUSES/WORMS:


 a)Virus is nothing but the file which can corrupt your system or can damage your system.The virus comes with some other files like when you download any file from internet then it may contain the viruses which will damage your system.b)The Worms is nothing but the file which you download from the internet and when it is fully downloaded,it will create the multiple folders and it will utilize much of your memory space.This causes that your system will easily crash and will ultimately damage your system.

 

4.HACKING/CRACKING:


a)Hacking is nothing but the seeing the others information which will be useful to damage that system.b)Cracking is nothing but stoleing the other system’s information and alter that information. This will also ultimately damage your system.

 

5.EMAIL BOMBING:

Email bombing is nothing but cyber criminals can send you much emails at a time which will crash your system.

 

6.SALAMI ATTACK:

Salami attack is related to your financial conditions.Cyber criminals can stole the information related to the finance system,and can use such credentials to hack your system.

 

7.TROJAN HORSE:

 Trojan Horse is the name given to one of the tools used by the cyber criminals.The cyber criminals can make some information available to the peoples which will be seen as the authorized,but it will be actually unauthorized.This when downloaded can affect your system at most.

 

8.DATA DIDDLING:

In data diddling the cyber criminals can alter the important information which will clash your system,and will affect much to you.

NOTE:

Hence you must keep safe your system with the help of various antivirus and other security tools.

Leave a Reply

Your email address will not be published. Required fields are marked *