virus
-attatched to another file/program
-deletes/corrupts data and files
worm
-self replicating
-slows computer
-creates back doors
trojan
-looks like legitimate software
ransomware
-denies access to system until ransom paid
pharming
-redirects user to spoof website without their knowledge
-by modifying DNS entries
spyware
-often bundled with free software
-logs activity and keystrokes
ways of preventing malware
-anti-virus
-use up to date operating system
-implement user access levels
-only download from trusted websites
-educate users of risks of opening files from unknown sources
social engineering
-tricking people into giving away critical info/details
-phishing (emails,webs,texts)
-pretexting (false story)
-shouldering (watch and memorise)
brute force attacks
-use of automated software to crack passwords
denial of service attacks
-server is flooded with bogus requests to bring it down
-firewalls can stop this by rejecting identical content and same source
SQL injection
-uses SQL commands entered into input fields on forms to gain access to databases
-input validation stops this by not permitting certain characters
packet sniffing
-intercepts network communications
-encryption stops this
penetration testing
-identifies weaknesses in computer systems