What is Malware
What are examples of malware
Malware is software written to infect computers and commit crimes. They exploit vulnerabilities in operating systems and browsers.
They do this for FRAUD or IDENTITY THEFT.
Malware is an umbrella term which covers:
-viruses
-trojans
-worms
-ransomware
-spyware
-adware
Viruses
Viruses are Programs embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data.
Trojans
Trojans are Programs which pretend to be legitimate but in reality are malware. They are often disguised as email attachments. Trojans cannot spread by themselves - instead they deceive a user into installing the program.
Worms
Programs similar to viruses except that they are not hidden within other files. Worms often spread through emails.
Ransomware
Ransomware are Programs that attempt to blackmail a user into making a payment to a hacker. Some types of ransomware do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid.
Spyware
Spyware are Programs that monitor user activities and send the information back to a hacker.
e.g. key logs
Adware
advertising-supported malware AKA Adware is a term used to describe unwanted software that displays advertisements on your device
Phishing
Phishing is an online fraud social engineering technique used by criminals used to entice consumers to disclose personal information by pretending to be a trusted entity. Used through email and websites.
Brute Force Attack
A trial and error method used to decode encrypted data such as passwords and keys.
Denial of Service
Overloading a server with useless traffic causing the server to crash. DDOS is a type of attack where multiple compromised systems(zombies) are infected with trojan horse which is then used to attack a single system.
Data interception and theft
An attacker monitors a data stream to or from a target in order to gather sensistive information.
It uses a technique called “Sniffing” or “Evesdropping”
They can find out unencrypted passwords or Configure information
SQL injection
SQL injection
This is a code injection technique used to attack data-driven applicaiton. It is able to view or change data in a data-base by inserting code into a text box.
Why is malware a problem
Phising - This poses a threat as:
Phising poses a threat as:
Brute Force Attack - This poses a threat as:
Denial of Service attack - This poses a threat as:
Data interception and theft - This poses a threat as:
SQL Injection - This poses a threat as:
How do people make their computer or network insecure?
How do you prevent malware?
Preventing Phising
PReventing Brute Force Attack
Preventing Denial of Service
Preventing Denial of Service
Preventing Data Interception