identify and describe spamming backdoor and rootkits types o

identify and describe spamming, backdoor and rootkits types of malicious computer network attacks, and analyze how these types of attacks are made, and how they can be combatted

Solution

rootkit allows to have control over a computer without the computer user knowing about it. when rootkit gets installed, the controller of the rootkit will have the ability to execute files and change system configurations on the host machine. A rootkit can also access log files and spy on the legitimate computer owner’s usage.
detect rootkits-
It is difficult to detect rootkits. it can be detected by observing strange behavior on a computer system. the best option to remove a rootkit is to completely reset or rebuild the effected system.
prevent rootkits-
rootkits can enter the computer systems by installling the software you trust or with a virus. in order to keep the system safe from rootkits you must include patches of your OS, applications and up-to-date virus definitions. Don\'t accept files or open email file attachments from unknown sources.

Backdoors work similar to Trojans or worms, except that they open a backdoor onto a computer, providing a network connection for hackers. Unknowingly PC users can install backdoors on their computers as they come attached to the e-mails or file-sharing programs .

Allows the intruder to create, delete, rename, copy or edit any file, change any system settings, control and terminate applications, install other software and parasites.

it is difficult to find or remove a backdoor manually and so it is better to use automatic removal option.

Spam is unwanted email with an advertising content sent out as a mass mailing. the advertising contents include ways to make money easily, miracle products, property offers, or simply lists of products on special offer.
the attacks are usually:
The email message sender address is usually unknown to the user.
it is sent via mobile devices using SMS .
the spammer looks in the mail list and notes down the addresses of the other members by obtaining database from companies and individuals.
the damages caused are-
Some important valid messages may be deleted unknowingly when deleting spam.
It may be used to distribute malware such as Trojans, keyloggers, backdoors etc.
In a spam mail, it is very easy to include an attachment with a virus or a link to a site, from which some type of malicious code is downloaded without the user knowing.
prevent spams-
Do not publish your personal email addresses in any public site, such as web pages for example.
Never click on the “unsubscribe” link in a spam message. All this will do is let the spammer verify that your email address is active.
Never reply to a spam message.
Do not open the spam message.
Do not purchase products offered to you through unsolicited emails.

identify and describe spamming, backdoor and rootkits types of malicious computer network attacks, and analyze how these types of attacks are made, and how they

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site