Please enable JavaScript.
Coggle requires JavaScript to display documents.
4.1 Threats (virus (A virus attempts to make a computer system unreliable,…
4.1 Threats
virus
-
A virus a computer program that replicates itself and spreads from computer to computer.
Viruses can increase their chances of spreading to other computers by infecting files on a network
file system or file system that is accessed by other computers.
-
-
Install, run and keep updated security software package
trojan horse
A Trojan horse is a standalone malicious program designed
to give full control of an infected PC to another PC.
Trojans often appear to be some that is wanted or needed by the user of a PC.
They can be hidden in valid programs and software (e.g. games).
Trojan horse can make copies of themselves, steal information, or harm the host computer systems.
-
-
Install, run and keep updated security software package
worm
-
A worm can use a computer network to spread.
Unlike a computer virus, it does NOT need to attach itself to an existing program.
Worms always cause some harm to a network, even if it’s only consuming the
bandwidth.
-
-
Install, run and keep updated security software package
adware
-
Automatically shows adverts such as pop-ups.
It may also be in the user interface of a software package or on an installation screen.
Install, run and keep updated a security software package. Do not open any files from an unknown source. Do not click any links in emails.
Bot
-
Allows a cyber-security attacker to take control of an infected computer system without the user’s knowledge.
Install, run and keep updated a security software package.
Do not open any files from an unknown source.
Do not click any links in emails.
bug
-
Usually the result of human error during the coding of the software.
Most bugs can be fixed by the software creator issuing a fix or patch.
-
ransomware
Ransomware - holds a computer system captive and demands a ransom,usually money, to release it.
Restricts user access to the computer system by encrypting files or locking down the computer system.
A message is usually displayed to force the user to pay so that the restrictions can be lifted and the user can
be given back access. It is spread like a worm.
Install, run and keep updated a security software package.
Do not open any files from an unknown source.
Do not click any links in emails.
rootkit
Rootkit- designed to remotely access or control a computer system
without being detected by the security software or user.
An installed rootkit can enable a cyber attacker to remotely access files, access/steal data and information,modify software configurations or control the computer system as part of a botnet.
Rootkits are difficult to detect as they are not usually detected by security software.
Software updates, keeping security software up to date and not downloading suspicious files are
the only ways of trying to avoid rootkit from being installed.
spyware
Spyware- can collect data from an infected computer, including personal information like websites visited, user logins and financial information.
Usually hidden from a user and can be difficult to detect. It is often secretly installed on a user’s personal computer without their knowledge. Some spyware such as keyloggers, however, may be installed intentionally to monitor users. Can also install additional software and redirect web browsers to different websites. Some spyware can change computer settings, which could lead to slow internet connection speeds or changes in web browser settings.
Install, run and keep updated a security software package.
Do not open any files from an unknown source.
Do not click any links in emails.