Please enable JavaScript.
Coggle requires JavaScript to display documents.
System Attacks and Threats (Malware (Viruses (They replicate their code in…
System Attacks and Threats
Malware
comes from two words
Mal
icious
to cause an act of harm
Soft
ware
are executable programs that run on a computer
Viruses
They replicate their code in other programs
They infect other computers
they harm the computer by deleting,corrupting or modifying files
worms
slow down networks and computers
computer Trojans
ransomware
holds a computer hostage
Spyware
allows attacker to see users computer without consent
rootkit
set of programs that aim to gain root or the administrator access to a computer
Social Engineering
social engineering is the ability to obtain confidential information by asking people for it
Phishing
phishing is a type of social engineering technique
emails,texts or phone calls are sent to users commonly pretending to be a bank or website
the "from" email; address may be forged
the messages may be
Usernames
Passwords
Credit cards details
other personal information
Hacking
1in5 uk citizen have have an account hack on the system
the uk expierences over 375 cyber attacks per hour
Botnet
Botnet comes from robot network
in botnet a hacker will first infect the machines to make zombie devices
common uses of botnet
denial of service attacks
sending spam
these compiters can be controlled by one central computer
Shoulder Surfing
shoulder surfing is the ability to get someones personal info or password by looking at them as they type
or using cctv camera
Denial of Service
(DOS)
in a denial service attack a hacker will use or infect a computer
Hacking a friends password
black hat hacking is against the law
Pairs
come up with three different ways that you could get their password
for one of these your friend mustn't know that you've tried to find out their password.