Page 20 - CyberSecurityEssentialsEnglish
P. 20
Figure 9 Man in the Middle attack
In spamming attacks, senders make unauthorized and organized use of an app to send annoying and
unsolicited messages and emails in bulk to their users, by compromised or fake profiles. These senders
include in them unreal links and ads, and they ask the recipients to click on them. Of course, these attacks
have an immensely negative impacts on them, the following figure 10 shows a real spamming email.
Figure 10 A real spamming email
Malware
Such attacks depend on sophisticated programs, referred to as "Malware". Malware is a program that employs a
vulnerability to compromise a network just as the recipient or user clicks a "planted" perilous email attachment or link,
utilized to install malicious software into the system. As malware is used on a large scale, it has various types as shown
in figure 11, mainly the following:
Virus: Is a malware type that attacks computers, through emails, infected flash drives or websites. It spreads by
attaching itself to legitimate programs and files that execute its code.
Trojans: They hide inside a helpful program with malicious purposes. Unlike viruses, a trojan doesn't replicate itself,
and it is commonly used to establish a backdoor to be exploited by attackers.
18

