Pages

Showing posts with label study oh. Show all posts
Showing posts with label study oh. Show all posts

software attacks

salam.1.malaysia.salam.uitm.

In Introduction Information System I have learn about Software attacks. well, for now software attacks have been occurring in which malware(malicious software) tried to infect as many computers worldwide as possible. Cybercriminals are heavily involved with malware attacks to make money and they use complicated attacks typically via the Internet. There are variety of software attacks.

(1) Virus - Segment of computer code that performs malicious actions by attaching to another computer program.


(2) Worm - Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another program).


(3) Trojan Horse - Software programs thar hide in other programs and reveal their designed behavior only when they are activated.




(4) Back Door(Trap Door) - Typically a password, known only to the attacker, that allows him or her to access a computer system at will, without having to go through any security procedures.

(5) Logic Bomb - Segment of computer code that is embedded with an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date.


(6) Password Attack Dictionary Attack - Attacks that try combinations of letters and numbers that are most likely to succeed, such as all words from a dictionary.


(7) Brute Force Attack - Attacks that massive computing resources to try every possible combination of password options to uncover a password.


The following picture is DES(Data Encryption Standard) cracker circuit board fitted with several deep crack chips which could brute force a DES key in a matter of days:




(8) Denial-of-Service Attack - Attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes.

(9) Distributed Denial-of-Service Attack - An attacker first takes over many computers, typically by using malicious software. These computers are called zombies or bots. The attacker uses these bots (which form a botnet) to deliver a coordinated stream of information requests to a target computer, causing it to crash.


(10) Phishing Attack - Phishing attacks use deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.



(11) Zero-day Attack - A zero day attack takes advantage of a newly discovered, previously unknown vulnerability in a software product. Perpetrators attack the vulnerability before the software vendor can prepare a patch for the vulnerability.

resource: En. Harun note slide, Introduction Information Systems International Student Version.

jumaat tanpa kelas

salam.1.malaysia.salam.uitm.

hari ini hari jumaat yang indah.huh! xtau nak mule mcam ane.. ari ni aku bngon lte abeh.pdahal tido awal.. kol 10 da mati dah. pelikkn.. biasenye aku msti terjge awal.. tapi nape la kan ari ni lngsung x terjage. da x psai2 subuh gajah.

dan dengan semangatnya ari ni aku g kelas dengan berbaju melayu tapi sua biase. sampai2 je da ramai dah. alhamdllah ada kerusi. klu x da kene g cari kat kelas len.. dok tunggu lec punye la lame. x sampai2.. dkat sejam da menunggu tapi x muncul2 jgak.
aduhai..
memkak je la dalm kelas. mcam budak sekolah..haha. sat tu klas rep bgtau x da kelas upenye..ape la nsib. dok bgin kene ktuk nagn dak rumah sbb bngon pagi g kelas sdngkan dme dok syok tido..

sedih btol aku.. da la kene pikul laptop ayie yang berat abeh.. mybe da full kot memori laptop 2 yang wat berat gile. haha.. da lec ku terchyunk.len kali calling la ea bile x da kelas..
sian lor kami! :-(

semangat untuk saya 'saya sayang law'

salam.salam 1 malaysia. salam uitm. da lame la plak aku tinggal bolg ku neh. sian die.. kne tinggal saje kan. konon da dok u neh ada la mase nak dok ngadap blog, tapi x da jugak. payoh sungguh! ngan assgmntnye ag.. adhai.....banyknye kje.. yg pling x best, aku x da duit!! ape la nceb cik jah uii...

yang aku nk cite ari neh pasai 'law' itu undang2 la.. manyak susa w0oo.. mcam senag. sali dapat soalan, aduhai.... mcam nak ngeh. dok lopong saja tengok jawapan n dengar lec berceloteh. nape la 'ram' pale aku ni kecik..lembap pikapnye. klau la bole upgrade jdi 18 GB ke kan bgus. dapat 2 GB pon da kre ok da 2. dpat gak aku kejar pe yg lec aja. ni 1 pon xla msok. mnyak sedih gle bebeng wo!!

moge2 terupdate la pale otak ku ini supaya senang nak ingt n paham ape yg die aja.. teknik 3E hm tuah da diguna tapi da 'ram' kcik.. x le wat pa la.. sardis!! :-(

ari pertama di university

salam.1.malaysia.. salam.uitm. hari ni aku first day kat u. serun beb diwatnye. mule2 masuk je da ase mcam x best sbb ada orientasi. biasa la kan, sape yg suke sgt orientasi neh. bak kte orang minggu cari salah. ada je yang kenenye.. tapi alhamdllah la, mpp kbm bek2 belaka. x da orientasi macam kat pat2 len. pas isyak je lantak kome la nk wat ape.. ape lagi. berjalan lah smua. beh 1 bandaraya melaka kami jajah. tapi yang x bpe bestnye ada plak ramai mak nyah kat sni. sali tgok macam pompan tapi ble da tersenyom.. aduhai! lakila weh.. takut aku. badan solid! muka cantek tapi.............. haha~. nyesal abeh senyom2.. t la ea.. ble aku dapt ambik pic dme aku upload kat blog. klu kome nak tgok la.. ada yang berkenan pon jgan mintak kat aku ea. kome cari la sendiri. moh datang melaka bersejarah!