usually introduced by errors in the operating system or application code, despite all the effort companies put into finding
Software vulnerabilities
Hardware vulnerabilities
Categorizing Security Vulnerabilities
his vulnerability occurs when data is written beyond the limits of a buffer. Buffers are memory areas allocated to an application.
Buffer overflow
Programs often work with data input. This data coming into the program could have malicious content, designed to force the program to behave in an unintended way
Non-validated input
weaknesses in security practices
This vulnerability is when the output of an event depends on ordered or timed outputs. A race condition becomes a source of vulnerability when the required ordered or timed events do not occur in the correct order or proper timing.
Race conditions
process of controlling who does what and ranges from managing physical access to equipment to dictating who has access to a resource, such as a file, and what they can do with it, such as read or change the file. Many security vulnerabilities are created by the improper use of access controls.
Access-control problems
Types of Malware
Spyware
Adware
From the word robot, a bot is malware designed to automatically perform action, usually online. While most bots are harmless, one increasing use of malicious bots are botnets.
Bot
This malware is designed to hold a computer system or the data it contains captive until a payment is made
Ransomware
his is a type of malware designed to persuade the user to take a specific action based on fear.
Scareware
This malware is designed to modify the operating system to create a backdoor. Attackers then use the backdoor to access the computer remotely
Rootkit
malicious executable code that is attached to other executable files, often legitimate programs
Virus
malware that carries out malicious operations under the guise of a desired operation. This malicious code exploits the privileges of the user that runs it
Trojan horse
malicious code that replicate themselves by independently exploiting vulnerabilities in networks
Worms
allows the attacker to take control over a device without the user’s knowledge. With that level of access, the attacker can intercept and capture user information before relaying it to its intended destination.
Man-In-The-Middle (MitM)
type of attack used to take control over a mobile device. When infected, the mobile device can be instructed to exfiltrate user-sensitive information and send it to the attackers.
Man-In-The-Mobile (MitMo)
two categories of malware
infectious methods
malware on basis of actions
they dont steal or spy but wait for instructions from hackers
zombies