1.4 Network Security Flashcards
What is Malware
What are examples of malware
Malware is software written to infect computers and commit crimes. They exploit vulnerabilities in operating systems and browsers.
They do this for FRAUD or IDENTITY THEFT.
Malware is an umbrella term which covers:
-viruses
-trojans
-worms
-ransomware
-spyware
-adware
Viruses
Viruses are Programs embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data.
Trojans
Trojans are Programs which pretend to be legitimate but in reality are malware. They are often disguised as email attachments. Trojans cannot spread by themselves - instead they deceive a user into installing the program.
Worms
Programs similar to viruses except that they are not hidden within other files. Worms often spread through emails.
Ransomware
Ransomware are Programs that attempt to blackmail a user into making a payment to a hacker. Some types of ransomware do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid.
Spyware
Spyware are Programs that monitor user activities and send the information back to a hacker.
e.g. key logs
Adware
advertising-supported malware AKA Adware is a term used to describe unwanted software that displays advertisements on your device
Phishing
Phishing is an online fraud social engineering technique used by criminals used to entice consumers to disclose personal information by pretending to be a trusted entity. Used through email and websites.
Brute Force Attack
A trial and error method used to decode encrypted data such as passwords and keys.
Denial of Service
Overloading a server with useless traffic causing the server to crash. DDOS is a type of attack where multiple compromised systems(zombies) are infected with trojan horse which is then used to attack a single system.
Data interception and theft
An attacker monitors a data stream to or from a target in order to gather sensistive information.
It uses a technique called “Sniffing” or “Evesdropping”
They can find out unencrypted passwords or Configure information
SQL injection
SQL injection
This is a code injection technique used to attack data-driven applicaiton. It is able to view or change data in a data-base by inserting code into a text box.
Why is malware a problem
- Files may be deleted, corrupt or are encrypted
- The computers may crash, reboot and slow down
- Internet connections may become slow
- Keyboard inputs are logged and sent to hackers
- If a client is infected then it can easily be passed to the server
Phising - This poses a threat as:
Phising poses a threat as:
- Access to bank accounts and credit cards.
- access to high value data
- Damage to brand reputation
Brute Force Attack - This poses a threat as:
- *- Theft of data
- Access to systems**