Posts

Showing posts from February, 2013

P1 - Describe How Networks Can Be Attacked

Trojans & Backdoors A Trojan is a destructive program that is hidden inside an application, at first glance it will appear to be useful software but will actually damage your computer once installed or run. For example the hacker would upload a file to the Internet called "Photoshop Cs5 For Free", within that application he would attach a Trojan Horse, anybody that downloads this file and runs it will be infected meaning the hacker could have access to thousands of computers. The Trojan can then create a backdoor by opening some of the computer ports without the user realising, these ports will then be used by he hacker to gain access to the users computer. Trojans do not reproduce by infecting other files and unlike viruses they do not self-replicate. Viruses Viruses are the most common type of threat to system security, they are man-made and can spread from computer to computer and across networks without the users even noticing. Almost all viruses are attached to a