II. Discussed topic
Information Security and Security Attacks:
Vulnerable systems can open themselves to a security attack. Security attacks are not only wide spread, they are growing fast. Here we describe some of the more recent and technologically complex attacks that have inundated the information networks and systems.
Denial of service: The attacker tries to prevent a service from being used rather than compromising it. Numerous hosts are used to perform a denial of service attack. Trojan horse: A malicious software which disguises itself as a benign software. Computer virus: Reproduces itself by attaching to other executable files and once executed can cause damage. Worm: A self-reproducing program that creates copies of itself. Worms can spread easily using e-mail address books. Logic bomb: lays dormant until an event triggers it, such as a date, user action, or in some cases may have a random trigger. IP spoofing: An attacker may fake its IP address so the receiver thinks it is sent from a location that it is not viewed by the receiver as a threat.
Man Sometimes refers to as session takeover in which the mugger accesses the network over an open meeting and, once the network verifies it, muggers the user computer to restrict it and uses IP spoofing to claim to be the client. Rootkit: A set of tools used by an attacker after gaining root-level access to a host computer to hide its actions on the host and document the mugger to continue root-level entree to the host through covert means. Denial of service (DoS) attacks have become more popular in recent years. The loss of service for the infected provider is the inability of a particular network service, such as e-mail, to be available or the brief loss of all network connectivity and services.
Viruses and their linked malware have been favorite types of attacks for hackers and others intend on damaging information security .Other types of safety breaches that can be proven very exorbitant to organizations are losses from computers, laptop or mobile hardware theft and destructions.
Ethics:
The field of ethics is worried with the understanding of the concepts of right and wrong behaviors. ethics is the study of what human behavior ought to be. It is defined as the