Game Preview

Cyber Attacks

  •  English    49     Unlisted
    This covers the different types of cyber attacks
  •   Study   Slideshow
  • This is a type of computer program that, when executed, replicates and attaches itself to other files, such as a legitimate program, by inserting its own code into it.
    virus
  •  15
  • Most of these require end-user interaction to initiate activation, and can be written to act on a specific date or time.
    virus
  •  15
  • This can be spread through removable media such as USB flash drives, Internet downloads and email attachments.
    virus
  •  15
  • This was released in 1999 and spread via email, affecting tens of thousands of users and causing an estimated $1.2 billion in damage.
    Melissa virus
  •  15
  • This is a malicious software program that replicates by independently exploiting vulnerabilities in networks.
    worm
  •  15
  • This can run by itself.
    worm
  •  15
  • Other than the initial infection of the host, these do not require user participation and can spread very quickly over the network, usually slowing it down.
    worm
  •  15
  • These share similar patterns: they exploit system vulnerabilities, they have a way to propagate themselves and they all contain malicious code (payload) to cause damage to computer systems or networks.
    worm
  •  15
  • In 2001, this infected over 300,000 servers in just 19 hours.
    the Code Red worm
  •  15
  • This is malware that carries out malicious operations by masking its true intent.
    Trojan horse
  •  15
  • This appears legitimate but is, in fact, very dangerous.
    Trojan horse
  •  15
  • This exploits the privileges of the user who runs it.
    Trojan horse
  •  15
  • This does not self-replicate but often binds itself to non-executable files, such as image, audio or video files, acting as a decoy to harm the systems of unsuspecting users.
    Trojan horse
  •  15
  • This is a malicious program that waits for a trigger, such as a specified date or database entry, to set off the malicious code.
    logic bomb
  •  15
  • This will remain inactive until the trigger event happens.
    logic bomb
  •  15
  • This can attack and destroy the hardware components in a device or server, including the cooling fans, central processing unit (CPU), memory, hard drives and power supplies.
    logic bomb
  •  15