Physical - Data centres, servers and connected terminals as physical components are the easiest way to steal data., Human - attacks are made via social engineering, which uses deception to build trust, convince people to give up confidential information., Operating System - must protect itself from security breaches, such as denial of service, memory-access violations and many more, Network - This is a growing area of concern as wireless communications, and portable devices become more and more common ., Trojan Horse - This program traps user login credentials and stores them to send to malicious users who can later log in to the computer and access system resources, Trap Door - If a program has a security hole in its code and performs illegal action without user knowledge,, Logic Bomb - is when a program misbehaves only when certain conditions are met; otherwise, it works as a genuine program, Virus - can replicate themselves on the computer system . They are highly dangerous and can modify/delete user files, crash systems., Worm - a process that generates multiple copies where each copy uses system resources,, Port Scanning - a mechanism or means by which a hacker can detect system vulnerabilities to make an attack on the system, Denial of Service - prevent users from making legitimate use of the system,

Standard security attacks- Operating systems 2

Leaderboard

Visual style

Options

Switch template

Continue editing: ?