Page 20 - CyberSecurityEssentialsEnglish
P. 20

Figure 9 Man in the Middle attack

       In  spamming  attacks,  senders  make  unauthorized  and  organized  use  of  an  app  to  send  annoying  and
       unsolicited  messages  and  emails  in bulk to  their  users,  by  compromised  or fake profiles.  These  senders
       include in them unreal links and ads, and they ask the recipients to click on them. Of course, these attacks
       have an immensely negative impacts on them, the following figure 10 shows a real spamming email.


























                                                Figure 10 A real spamming email
       Malware

       Such attacks depend on sophisticated programs, referred to as "Malware". Malware is a program that employs a
       vulnerability to compromise a network just as the recipient or user clicks a "planted" perilous email attachment or link,
       utilized to install malicious software into the system. As malware is used on a large scale, it has various types as shown
       in figure 11, mainly the following:

       Virus:  Is  a  malware  type  that  attacks  computers,  through  emails,  infected  flash  drives  or  websites.  It  spreads  by
       attaching itself to legitimate programs and files that execute its code.

       Trojans: They hide inside a helpful program with malicious purposes. Unlike viruses, a trojan doesn't replicate itself,
       and it is commonly used to establish a backdoor to be exploited by attackers.


          18
   15   16   17   18   19   20   21   22   23   24   25