Please enable JavaScript.
Coggle requires JavaScript to display documents.
4.1 Types of Threats (Type of Malware (Adware
Generates revenue from its…
4.1 Types of Threats
-
-
Bug
- connected to software + flaws produce unwanted outcomes.
How does it work
- usually a result of human error when coding of the software.
- Bugs are fixed by the software creator issuing a fix or a patch.
- Security bugs are a severe type, allows cyber attackers to bypass user authentication, override access privileges or steal data.
How to mitigate this effects
- Check for + install any patches that are released from software vendors.
Ransomware
Why is it used?
- Holds a computer system captive or demands a ransom, usually money, to release it.
How does it work
- Restricts user access to the computer system by encrypting files/locking down the computer system.
- A message is displayed , asking the user to pay to open the restrictions , so the user can have access to the computer system.
- It is spread like a worm.
How to mitigate its effects
- Install,run or keep updated a security software package.
- Do not open files from unknown sources.
- Do not click any links in emails.
Rootkit
It is designed to remotely access or control a computer system without being detected by the security software system or the user.
How does it work
- Installed rootkit remotely allows the cyber attacker to access files
- access/steal data + information
- Modify software configurations
- Control the computer system as part of the bot net.
How to mitigate its effects
- Usually difficult to detect Rootkits by security software.
- Software updates.
- Keeping security software up to date
- Not downloading any suspicious files
- Avoid Rootkits from
Spyware
Collects data from an infected computer including financial information,User logins + websites visited
How it works
- Hidden from a user and difficult to detect .
- Secretly installed on a user's computer without their knowledge.
- Spywares such as key loggers are installed intentionally to monitor users.
- Can install additional software + redirect web browsers to different websites.
- Some spyware change computer settings, lead to slowing internet connections/changes in web browser settings.
How to mitigate its effects
- Do not open files from unknown sources.
- Do not click links in emails.
- Install,run + keep updated a security software package.
-
-
-
What is a Botnet?
- Several computers being infected by bot malware.This allows the botnet and the person who created it to take control of the computer system.
OR An interconnected network of infected computer system.
Malware- malicious software installed in a computer system and collects information about users without their knowledge.