Please enable JavaScript.
Coggle requires JavaScript to display documents.
system attacks and threats (botnet (common uses for botnets are: (denial…
system attacks and threats
malware
there are 5 types of malware
malware ransomware
holds a computer hostage by locking or encrypting access to it.
malware Trojan horses
they have a program, game or cracked file which is something the user wants.
malware virus and worms
they have negative program code which causes damage, takes control or provides access to the computer.
malware spyware
spyware allows an attacker to spy on a users computer without their consent.
malware rootkit
A root kit is a set of programs that aims to gain root or administrator access to a computer.
malware are executable programs that run on a computer.
hacking
the UK experience over 375 cyber attacks every hour
1 in 5 UK citizens have had an online account hacked.
phishing
emails texts or phone calls are sent to users commonly pretending to be from a bank or website.
denial of service
in a denial service attack, a hacker will use or infect a computer so that:
the server cant respond fast enough so slows down or goes offline.
it sends as many requests to the server as it can (known as a flood)
in a distributed denial of service attack (DDoS),many computers are used to send the request.
shoulder surfing
shoulder surfing is the ability to get information or passwords by observing as someone types them in.
2 examples are
using a CCTV camera
looking over someones shoulder
social engineering
social engineering is the ability to obtain confidential by asking people for it.
hacking a friends passwords
black hat hacking is against the law.
if given the information or access to your device, your friend or someone you trust could you this accessibility to your device to hack you.
botnet
botnet comes from robot network
in a botnet, in a botnet a hacker will fist infect machines to make zombie devices.
these computers can then be controlled by one central computer.
common uses for botnets are:
denial of service attacks.
spending spam.
this gives a hacker and anonymous access to computers.
pharming
pharming is a way of redirecting a legitimate websites visitors to a fake website run by a hacker.