DOCTYPE HTML

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

<!

DOCTYPE html>
<html>
<head>
<title> CYBER CRIMES </title>
</head>
<body>
<h1> This is Largest</h1>
<h2> This is Larger</h2>
<h3> This is Large</h3>
<h4> This is small</h4>
<h5> This is Smaller</h5>
<h6> This is Smallest </h6>
<h7> This is Normal</h7><br>
<p1 p style="color:#ff0000f2"><br><i><mark>Active: </mark></i>Active cyber
attacks interrupt or alter normal system operations. Though it is possible to
maintain stealth, these attacks can often be disruptive, with the victim
becoming aware of the breach during or shortly after the attack is complete.
They also typically have more destructive goals, like locking users out,
deleting data, or leaching power. Examples include ransomware, DOS attacks, or
cryptojacking. </p1p><br>
<p2 p style="color:blue"><br><mark><b>Passive:</b></mark> <strong>Passive
cyber attacks tend not to affect system resources. Their intent is to gather
intelligence, which can often go unnoticed by victims. Once access is gained,
passive attacks monitor systems and find sensitive information. This data can
be collected through various means, including copying files, or eavesdropping
on and recording communications through methods like keystroke
logging.</p2p><br>
<p3 p style="color:orchid"><br><mark><strong>What Was the
Engagement?<br></mark>We were tasked with completing an internal penetration
test on a large, multi-national manufacturer. </p3p><br>
<p4 p style="color:orange"><br><i><mark>Virus:</mark></i>Just like its
biological namesake, a computer virus infects a computer system by replicating
itself without user permission, inserting its own code into preexisting
programs. In order to spread to other systems, the virus must be attached to a
file or executable program, and only infects a system when opened. This
typically causes various amounts of damage, from impeding work through
annoying popups to causing a complete system crash </p4p><br>
<p5 p style="color:green"><br><mark><b>Worm:</b></mark>Similar to a virus, a
worm can replicate itself on a computer system and cause varying levels of
damage. Unlike a virus, a worm is a standalone program, and does not need to
be attached to a file and opened to spread. A worm exploits vulnerabilities in
a system, and uses network connections to infect other systems with similar
weaknesses. </p5p><br>
<p6 p
style="color:yellowgreen"><br><mark>Ransomware:<strong></strong></mark>Ransomw
are is software that holds data hostage, with the threat to publish it or
destroy it unless a ransom is paid. Unfortunately, even if organizations pay,
they’re not guaranteed to get their data back, and giving into demands only
encourages a repeat attack. </p6p><br>
<p7 p style="color:yellow"><br><mark><i>Cryptomining
Malware:</i></mark>Cryptomining malware infects a computer system like a
parasite, sucking the processing power to use it to mine for cryptocurrency.
This allows cryptominers to mine more transactions faster, turning a way to
make a couple extra bucks into a major payout. Unfortunately, it leaves the
victims with painfully slow systems, or ones that end up crashing altogether.
When it comes to cryptojacking, the more power, the better. Consequently,
organizations with multiple computers and servers make perfect
targets.</p7p><br>
<p1 p
style="color:gold"><h1>Subscript</h1></p><br>H<sub>2</sub>+O<sub>2</sub>=H<sub
>2</sub>O<br></p1p><br>
<p1 p style="color:rgb(213, 255,
4)"><h1>Superscript</h1></p>(a+b)<sup>2</sup>=a<sup>2</sup>+b<sup>2</sup>+2ab<
br><c></p1p><br>
<img src="D:\Downloads Google Chrome\KLU logo.jpg" alt="Picture" width="491"
height="337"></c><br>
<img src="D:\Downloads Google Chrome\download.png" alt="Picture" width="200"
height="50"></c><br>
<br>
<h1><marquee behavior="scroll" direction="right">Dinesh Srisanth--
2200031469</marquee></h1><br>
<a href="https://newerp.kluniversity.in/"><h1>KL ERP</h1></a>
</body>
</html>

You might also like