Please enable JavaScript.
Coggle requires JavaScript to display documents.
Malware = Malicious Software ((Botnet (Collection of comuputes that have…
Malware = Malicious Software
Virus
Attach to a file
Use Anti Virus
Malicious program designed to harm your systems
Slow PC
Files change size
Files disapper
Icons Look DIfferent
Require human interaction
Worms
Does not attach to file
It multiplies itself on a network
Self replicates
No human interaction
Trojans
Appear Good
Gain use of software
MacKeeper
Bad
Background actions, limit use, steal data, corrupt data..
Adware= Advertising software
Pop-Ups
Distracting
Can deliver malicous payload
If you select
Some Auto Attack
Can use Adblockers
Issue sites require allowing pop-ups
Demo: Whitelisting
Spyware= Spying software
Cookie files can tell what been looking at and where been going
A tracking
Can be a invasion of privacy tracking cookieis
Could be abused to stalk you and tell certain things about you and devise how to pursuade you
Browsing pushes cookie files
Deleting cookies: inefficient
Antispyware
Botnet
Collection of comuputes that have been comprimised
Malicious used in a cohesive fashion to act agressivly
Usually used in DDOS Attack
Ransomware
Locks away your data base
Can lock your screen a system
Only One choice to move forward
Must follow instructions to release from ransomware
Back Up Data
System restore to a previous date
Use of Virus or Trojan software to part you from money by locking your system
Logic Bombs
Code inserted in your software to activate later
denil of service
Server shut down
criple services for a time
hard to Detect until it triggers
Can be realized if event occurance repeated
Triggers at a Specialized date, time, or event
Can Be Done by IT
Polymorphic Malware = "ManyForm"
Mutating over time av cannot track it anymore
Designed to change form
Backdoors
Can be put in place by admin and malicious actors
to correct code back door to bettwer manage the software
Best practice: make sure remove backdoor before software introduction
Use Two persons policy one to write and one to review and upload
Entry to system withjout authenticating
Gaurenteed access to the system
Armoured Virus
Changes structure each time it moves to a machine
s encrypted to prevent scans and av is helpless and cannot tell system is infected
Root Kits
Malicious tools to gain administrative access to your system and hide.
Easily available kits they can gain access, hide presence, tweak
Longer they can stay the better, sooner you kickem the better