Sun, Nov

Anatomy of Cyber Attack | CSS | Essay

CSS Essay

Cyber Attack:

A Cyber-attack (also called a computer network attack and CNA) is

“Malicious computer code or other deliberate act designed to alter, disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves.”

Types Of Cyber Attack:


The word "spoof" means to hoax, trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of another user on the Internet.

Man in The Middle:

An attacker manages to infiltrate a communication system to impersonate each endpoint to the satisfaction of each other. This can be done very easily if an attacker connects to an unencrypted wireless access point. The attacker can then intercept the information sent from an unsuspecting victim as well as the information they would be expecting to receive.


It is the process of one person assuming the identity of an authorized computer user by acquiring identifying items, knowledge, or characteristics.

Trojan House:

A Trojan is a piece of software that can have similar functionality to spyware, however, it gives the attacker more control, i.e. remote access or control of the victim’s system.

Semantic attack:

It is the modification and dissemination of correct and incorrect information. Information modified could have been done without the use computers even though new opportunities can be found by using them.


Worms do not need another file or program to copy itself; it is a self-sustaining running program. Worms replicate over a network using protocols. The latest incarnation of worms make use of known vulnerabilities in systems to penetrate, execute their code, and replicate to other systems.

Denial Of Services:

A denial of service attack is an effort to make one or more computer systems unavailable. It is typically targeted at web servers, but it can also be used on mail servers, name servers, and any other type of computer system.

Web De-Facing:

A website defacement is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own. The Website Defacer makes fun of the system administrator for failing to maintain server security.


Viruses are a self-replicating program that can attach itself to another program or file in order to reproduce. The virus can hide in unlikely locations in the memory of a computer system and attach itself to whatever file it sees fit to execute its code. It can also change its digital footprint each time it reproduces making it even harder to track down in the computer.

Transit Virus:

It occurs when one autonomous network agrees to carry the traffic that flows between another autonomous network and all other networks.

Resident Virus:

A resident virus installs itself as part of the operating system upon execution of an infected hosts program. The virus will remain resident until the system is shutdown.

Logic Bomb:

A small, malicious program that is activated by a trigger (such as a date or the number of times a file is accessed), usually to destroy data or source data.

Macro Virus:

It is a specific type of computer virus that is encoded as a micro embedded in some documents and activated when the document is handled.

File Server:

A file Virus is which executes when an infected file is executed (typically, a file with the extension , EXE, COM, BAT etc.