Malware, Electronic Infection & Cyber Crime Flashcards
What are the different types of electronic infections
Computer virus
Trojan horse
Worm
Spyware & Adware
Ransomware
Email malware
What is a computer virus
A secret program which contains the instructions to make copies of itself and insert this copy into legitimate programs. Each time the legitimate program runs, a new copy of the virus is made (called replication) they can remain in memory or on the disk. They usually attack data as well
What is a Trojan horse
Pretends to be a useful program, often a gimmicky or funny one, but in reality it has a hidden agenda to cause damage. It doesn’t make copies of its and it succeeds because enough people copy it download it without realizing it’s real purpose
What is a worm
A secret program which makes copy after copy of itself (without needing a host program) and can fill up memory and disk space. Can also copy itself from machine to machine over a network or the internet
What is spyware and adware
Programs that attach onto your operating system usually from the internet. They are designed to track your internet habits, annoy you with unwanted sales offers or generate traffic for their host website.
not to be confused with ‘cookies’ which are legitimate
What is ransomware
A program which infects your machine either through email or the internet. It encrypts the data on personal computers, and prevents users from accessing their files until a ransom is paid. Some versions of ransomware will claim a computer has been “used for illegal activity” and/or has been “locked by the police”
What is email malware
Any type of malware can be attached to or inserted in an email and this is now the most common method of transmission. Usually transmission is continued when a further message is sent to people in the victims address book
What is phishing
Phishing aims to get the user to bypass security and is the most common type of scam globally. often it takes the form of an email or message from an apparently legitimate source urging you to login to their site to update some details.
In reality it uses a copy of the legitimate site and wants to obtain user details and eventually credit card details/money.
Phishing attacks can also be made via phone calls.
What makes spear phishing different to phishing
Spearfishing is a more sophisticated attack that includes customized information (name/phone number/email address) that makes the attacker seem more like a legitimate source
When was the first advance fee scam
The Spanish prisoner scam dates back to the late 1700s.
The Nigerian scam has many variance and probably started with letters, then telegram and nowadays uses emails
What problems can be caused by these infectious programs
Causes unexpected system crashes, hangs or shutdown
Alters the behavior and functionality of application programs
Corrupts the directory information stored on the disc, encrypting data, deleting data or hiding files
Causes problems with printing documents, starting applications and opening and closing windows
Sends itself to your contacts and creating a bad impression and ill-will
Fills RAM and prevents other data being read
Pesters you with pop-ups
What is a Distributed-Denial-of-Service attack (DDoS)
DDoS attacks affect hosts of websites or other online services and aim to make the service unavailable to its intended users by overloading it with fake random communications – often generated by bots.
It can also be used to block a mobile phone and can be political or commercial in nature
How do you avoid malware
Use an up-to-date, fully supported operating system
Install security patches as soon as they become available
Never click links or attachments in unsolicited emails
Remember a work PC not a – and it’s commercial use should be paramount
Don’t be the weakest link