Please enable JavaScript.
Coggle requires JavaScript to display documents.
MALWARE - Coggle Diagram
MALWARE
-
-
-
-
-
-
bypass user authentication, override access privileges, or steal data. Bugs can
be prevented with developer education, quality control, and code analysis
-
-
-
Botnets cause distributed denial-of-service attacks (DDoS Attack). In 2016 there was a DDoS attack that affected PSN & some Xbox Live apps.
-
-
-
-
-
-
late 1980s, and payment was to be sent via snail mail. Today,
-
-
-
-
-
-
-
-
-
-
A rootkit is a collection of computer software, typically
malicious, designed to enable access to a computer or an
-
-
-
-
It gathers information about you, including the sites you visit, the
things you download, your usernames and passwords, payment
information, and the emails you send and receive.
-
permission, attaching itself to your operating system. You might
-
-
-
Whatever way spyware manages to get on your PC, the method of
operation is generally the same—it runs quietly in the background,
-
-
In Virgil’s epic poem, The Aeneid, a clever Greek war strategist
-
of Troy. Instead of destroying or climbing the city’s walls, Odysseus
-
Greeks appear to sail away, leaving behind a giant wooden horse as
a token of surrender. Drunk on victory, the Trojans bring the horse
inside their walls, only to discover Odysseus and his men were
-
-
-
common medium for spam is email, but it is not uncommon for spammers to
use instant messages, texting, blogs, web forums, search engines, and social
-
While spam is not actually a type of malware, it is very common for malware
-
with viruses, worms, or other malware are used to distribute spam messages
-
-
-
-
computers, they all can produce similar symptoms. Computers that are
-
-
-
-
-
-
Appearance of strange files, programs, or desktop icons
Programs running, turning off, or reconfiguring themselves (malware will
-
-
-
-
-
-
-
-
-
in 1982 for the Apple II, and other versions quickly followed.
-
Adware:Unwanted software designed to throw advertisements up on your screen, most often within a web browser. Some security professionals view it as the forerunner of the modern-day PUP (potentially unwanted program). Typically, it uses an underhanded method to either disguise itself as legitimate, or piggyback on another program to trick you into installing it on your PC, tablet, or mobile device.
-
-
without any human interaction, and it does not need to attach itself to a
-
Once opened, these files could provide a link to a malicious website or
automatically download the computer worm. Once it’s installed, the worm
-
Worms can modify and delete files, and they can even inject additional
-
-
resources, such as hard drive space or bandwidth, by overloading a shared
network. In addition to wreaking havoc on a computer’s resources, worms
can also steal data, install a backdoor, and allow a hacker to gain control
-
-