IAS MT Flashcards
It stands for “Malicious Software”
Malware
it is designed to gain
access or installed into the computer without the consent of the user.
MALWARE
They
perform unwanted tasks in the host computer for the benefit of a third party.
MALWARE
simply written to distract/annoy the user, to the complex ones which
captures the sensitive data from the host machine and send it to remote
servers.
MALWARE
It is a special type of malware which is used for forced advertising.
ADWARE
They either redirect the page to some advertising page or pop-up an additional page which promotes some product or event.
ADWARE
are financially supported by
the organizations whose products are advertised.
ADWARE
There is some malicious software which are downloaded along with the free software offered over the internet and installed in the host computer without the
knowledge of the user.
Browser Hijacking software
This software modifies the browsers setting and redirect
links to other unintentional sites.
Browser Hijacking software
It is a special type malware of which is installed in the target computer with or without the user permission and is designed to steal sensitive information from the target machine.
SPYWARE
Mostly it gathers the browsing habits of the user and the send it to the remote server without the knowledge of the owner of the computer. Most of the time they are downloaded in to the host computer while downloading freeware i.e. free application programs from the internet.
Spyware
may be of various types; It can keeps track of the cookies
of the host computer, it can act as a keyloggers to sniff the banking
passwords and sensitive information, etc.
spyware
is a malicious code written to damage/harm the host computer by deleting or appending a file, occupy memory space of the computer by replicating the copy of the code, slow down the performance of the computer, format the host machine, etc. It can be spread via email attachment, pen drives, digital images, e-greeting, audio or video clips,
etc.
Virus
may be present in a computer but it cannot activate itself
without the human intervention. Until and unless the executable file(.exe)
is execute, cannot be activated in the host machine.
Virus
They are a class of virus which can replicate themselves.
Worm
They are different from the virus by the fact that they does not require human intervention to travel over the network and spread from the infected machine to the whole network.
Worms
can spread either through network, using the loopholes of the Operating System or via email. The replication and spreading of the this over the network consumes the network resources like space and bandwidth and force the network to chok
Worms
is a malicious code that is installed in the host machine
by pretending to be useful software.
Trojan Horse
The user clicks on the link or download the file which pretends to be a useful file or software from legitimate source. It not only damages the host computer by manipulating the data but also it
creates a backdoor in the host computer so that it could be controlled by a remote computer.
Trojan Horse
a network of computers which are infected by malicious code and controlled by central controller.
Botnet(robot network)
The computers of this network which are infected by malicious
code are known as
Zombies
are networks of hijacked computer devices used to
carry out various scams and cyberattacks.
Botnet
The term “botnet” is
formed from the word’s
Robot and network
serve as a tool to automate mass attacks, such as data theft,
server crashing, and malware distribution.
Bots
It holds the host computer hostage until the
ransom is paid. The malicious code can neither be
uninstalled nor can the computer be used till the ransom is
paid.
Scareware
When was the internet born?
Around 1960’s
When was the the
trend changed from causing the physical damaging to computers to making a
computer malfunction using a malicious code
Around 1980’s
This term is used to describe a unlawful activity in
which computer or computing devices such as smartphones, tablets,
Personal Digital Assistants(PDAs), etc. which are stand alone or a part
of a network are used as a tool or/and target of criminal activity.
Cyber Crime
It is
often committed by the people of destructive and criminal mindset
either for revenge, greed or adventure.
Cyber Crime
An attack to the network or the computer system by some person with authorized system access is known as?
Insider attack
It is generally performed
by dissatisfied or unhappy inside employees or contractors.
Insider attack
The
insider attack could be prevented by planning and installing an?
internal intrusion detection systems (IDS)
When the attacker is either hired by an insider or an external entity
to the organization
External attacker
These attacks are generally performed by amateurs who don’t have
any predefined motives to perform the cyber attack. Usually these
amateurs try to test a tool readily available over the internet on the network
of a random company.
Unstructured attack
These types of attacks are performed by highly skilled and
experienced people and the motives of these attacks are clear in their
mind. They have access to sophisticated tools and technologies to gain
access to other networks without being noticed by their Intrusion Detection
Systems(IDSs).
Structure attack
these attacker have the necessary expertise to develop or
modify the existing tools to satisfy their purpose.
Structured attacker
These types of attacks are
usually performed by professional criminals, by a country on other rival
countries, politicians to damage the image of the rival person or the country,
terrorists, rival companies, etc.
Structured attacker
In the hierarchical organizational structure, it is the head of the organization
Criminal boss
In the hierarchical organizational structure, they are the trojan provider and manager
Under boss
In the hierarchical organizational structure, they are the attackers crimeware toolkit owner
Campaign manager and stolen data reseller
6 reasons for commission of cyber crimes
Money
Revenge
Fun
Recognition
Anonymity
Cyber Espionage
One of the six reasons for commission of cyber crimes, It is considered to be pride if someone hack the highly secured
networks like defense sites or networks.
Recognition
One of the six reasons for commission for cyber crime, At times the government itself is involved in cyber trespassing to
keep eye on other person/network/country. The reason could be politically, economically
socially motivated.
Cyber Espionage
19 kinds of cyber crime
Cyber stalking
Child pornography
Forgery and counterfeiting
Software piracy and crime related to IPRs
Cyber Terrorism
Phishing
Computer vandalism
Computer hacking
Creating and distributing viruses over internet
Spamming
Cross site scripting
Online auction fraud
Cyber squatting
Logic bombs
Web jacking
Internet time thefts
Denial of service attack
Salami attack
Data diddling
Email spoofing
It is a process of changing the header information of an e-mail so that its
original source is not identified and it appears to an individual at the receiving end that
the email has been originated from source other than the original source
Email spoofing
It is a practice of changing the data before its entry into the computer system.
Often, the original data is retained after the execution on the data is done.
Data diddling
It is an attack which proceeds with small increments and final add up to lead to
a major attack. The increments are so small that they remain unnoticed
Salami attack