International Journal of Computer Science & Engineering Technology (IJCSET)
In terms of computing, a malicious attack is an attack that can be used to compromise the system state with the intent of acquiring, destroying, modifying or accessing a user's data without any permission. Physical attacks typically mean either the theft of hardware storing personal/confidential information or the destruction of said hardware. Electronic attacks (the focus of this presentation) involve unauthorized access or unauthorized modification of the user's computer. Malicious attacks like viruses, worms, Trojan horses, logic bombs (a.k.a. time bombs), and trapdoors, phishing/spoofing can be accessing victim system resources without getting any permission.