0% found this document useful (0 votes)
27 views3 pages

Internet Scam

Uploaded by

fatimaajmal004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views3 pages

Internet Scam

Uploaded by

fatimaajmal004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Internet Scam

Scam in term of computer means an illegal activity on internet to steal data by deceiving. Internet-
based scam expose people and computer systems to harm online. A broad scope of dangers fits
into this category, including well-known threats like malware, phishing, pharming and computer
viruses. However, other threats, like offline data theft, can also be considered part of this group.
Various threats are discussed here.

DoS (Denial of Services) Attack


A DoS (denial-of-service) attack is a cyberattack that makes a computer or other device
unavailable to its intended users.

In a DoS attack, the cyber attackers typically use one internet connection and one device to send
rapid and continuous requests to a target server to overload the server’s bandwidth. DoS attackers
exploit a software weakness in the system and proceed to exhaust the RAM or CPU of the server.

Malware
Malware, short for malicious software, refers to any intrusive software developed by
cybercriminals (often called hackers) to steal data and damage or destroy computers and computer
systems. Examples of common malware include viruses, worms, Trojan viruses, spyware, adware,
and ransomware.

Virus
A computer virus is a type of malicious software, or malware that spreads between computers and
causes damage to data and software.

Worms
A computer worm is a type of malware whose primary function is to self-replicate and infect other
computers while remaining active on infected systems.

A computer worm duplicates itself to spread to uninfected computers. It often does this by
exploiting parts of an operating system that are automatic and invisible to the use.
Trojan Virus
A simple way to answer the question "what is Trojan" is? it is a type of malware that typically gets
hidden as an attachment in an email or a free-to-download file, then transfers onto the user’s
device. Once downloaded, the malicious code will execute the task the attacker designed it for,
such as gain backdoor access to corporate systems, spy on users’ online activity, or steal sensitive
data. Indications of a Trojan being active on a device include unusual activity such as computer
settings being changed unexpectedly.

Unlike computer viruses, a Trojan horse cannot manifest by itself, so it needs a user to download
the server side of the application for it to work. This means the executable (.exe) file should be
implemented and the program installed for the Trojan to attack a device’s system.

Spyware
Spyware is a kind of malware that secretly gathers information about a person or organization and
relays this data to other parties

The primary goal of spyware is usually to obtain credit card numbers, banking information and
passwords. But spyware can also be used to track a person's location

Adware
Adware is a type of malicious software that secretly installs itself on your device and displays
unwanted advertisements and pop-ups. In some cases, adware can even track your online behavior
and display personalized ads.

Ransomware
Ransomware is a malware designed to deny a user or organization access to files on their computer.
By encrypting these files and demanding a ransom payment for the decryption key.

Phishing

Phishing is a technique in which the attacker tries to find the sensitive information of users by the
means of electronic communication illegally.
For example, emails that inform users of suspicious activity on their accounts and ask them to
change their password. These phishing attacks aim to steal credentials or other confidential
information. For example, phone numbers, account numbers, social security numbers, and credit
card detail.

Pharming

Pharming is an online scam similar to phishing, where a website's traffic is manipulated, and confidential
information is stolen. In essence, it is the criminal act of producing a fake website and then redirecting users
to it

Difference between pharming and phishing

A key difference between pharming vs. phishing is that pharming requires an attacker to gain unauthorized
access to a system, while phishing only requires successful social engineering. In this example pharming
attack, the attacker injects malicious DNS records to redirect web traffic.

You might also like