Please enable JavaScript.
Coggle requires JavaScript to display documents.
Malicious code and activity (What malware us and how it inflicts harm on…
Malicious code and activity
What malware us and how it inflicts harm on your systems
when an attacker sends commands directly to your system and your system executes them
for example, when an attacker gains administrative control of the system and uses commands to conflict harm
when an attacker uses software programs that harm your system or make data unusable
instructions that run on a computer system and perform operations that the user does not intend
what the main types of malware are
a virus is an executable program that attaches to, or infects other executable programs
system infector is a virus that targets a copmuter hardware and software startup functions
file infectors are viruses that attack and modify executable programs
what the history of malicious code is
first virus was in the 1980s
in the 90's it started to become more of a threat
in the 200's it grew rapidly to what it is today
what motivates attackers and what assets they are targeting
they want to be famous
they want to impose their political beliefs or systems on others
they want money
they are angry and they want to exact revenge on those who have angered them
how malware is a threat to business organizations
the attacks against availabilty of services and resources
attacks against productivity and performance
they are worruied about the attacks on privacy and confidentiality
what tools and techniques detect attaxks
antivirus scanning software
content/context filtering and logging software
network monitor and analyzer
what tools and techniques prevent attacks
operating system defenses
network infrastructure defenses
application defense