Please enable JavaScript.
Coggle requires JavaScript to display documents.
Mobile Device Vulnerabilities - Coggle Diagram
Mobile Device Vulnerabilities
Trojan Horse
Spread by program to trick users into downloading and installing malware
It is designed to appear or disguised as a legitimate software.
Install trusted internet security - install easy-to-use cybersecurity software
Keep up to date - keep your system’s software up-to-date.
Be alert to email attachments - be cautious about attachments in any unexpected emails.
Be alert to email links – never cliick the link if something doesn’t seem quite right.
Create a backdoor of your computer.
Gives malicious users access to your system.
Allowing confidential or personal information to be compromised.
Steal data, install more malware, modify files, monitor user activity,
Botnets
The software programs created to automatically perform specific operations.
A set of compromised devices can be controlled and coordinated remotely
Spread by sending copy of it from compromised devices to other devices via text messages and e-mail messages.
Cosequence
Take advantage of unpatched exploits
Provide hackers with root permissions over(make phone calls and access photos
Preventation and Solution
Websites can guard against bots with CAPTCHA tests verify users as human.
Only download apps from trusted and reputable app stores
If you spot unusual behaviour on your phone like your battery suddenly running low, sudden disconnections from networks or services.
Worm
A subtype of virus which is can self-replicate without a host program and active on an infected system.
Spreads Independently ; directives from the malware authors and also over mobile networks by exploiting OS vulnerabilities
Cause harm to their host networks by;
Consuming bandwidth
Overloading web servers
Slowing or halting other tasks
Preventation and Solution
Use anti-virus(anti-worm) to remove the worm.
Avoid public or unsecured Wi-Fi channels which can act as a vector through which worms can travel.
Never download files from unknown sources
Rootkit
A program or a collection of software tools which give a threat actor remote access and control over a computer or other system without being detected by users or security programs and also does Silent operation difficult to prevention, detection and removal
Spread by hiding in software(may appear to be legitimate and trick users giving the rootkit permission to be installed
After installed in victim:
Modify system configurations -
Install concealed malware
Access or steal information
Solution & Prevention
Latest anti-malware programs can detect and remove rootkits
hiding in a system.
Regularly patching vulnerabilities in software, applications and OS
Performing static analysis scans.