• For each of the following attacks EXPLAIN: o The main characteristics of :
The installation of a backdoor on a network not belonging to the user.
A back door is method of admission to access a particular computer program which circumvents any security mechanisms. A programmer, for example, may in some cases install a back door due to the fact that this would result in the program being accessed for troubleshooting or other different purposes. But in spite of that, attackers and intruders often manipulate back …show more content…
The subject, referred to as “Duuzer” by researchers, has an objective to appropriate valuable information, aiming at places like South Korea and elsewhere.
The Trojan that was found has been design to penetrate and upset 32-bit and 64-bit systems that run windows 7, Windows Vista as well as the older and previous operating system Windows XP
http://thehackernews.com/2015/10/computer-malware-attack.html
“Duuzer” grants the faultfinder special but unauthorized access to the vulnerable computer system, and allows to gather information belonging to the system and drive. They are able to itemize and end ongoing processes while having the freedom to view, delete and even make changes to files such as time attributes. The attack has access to the extent that he can upload and extract numerous files. With this, they are able to intialise commands that are malicious and harmful to the computer. Duuzer compromises the safety of data as it is then vulnerable to