Please enable JavaScript.
Coggle requires JavaScript to display documents.
WORM, ROOTKIT, TROJAN HORSE, BOTNETS - Coggle Diagram
WORM
Solution & Prevention
-
-
-
Never click on attachments or links in emails or other messaging applications that might expose systems to malicious software.
-
INTRODUCTION
A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems. A computer worm duplicates itself to spread to uninfected computers. It often does this by exploiting parts of an operating system that are automatic and invisible to the user.
The way it spread out
While some computer worms require user action to initially propagate, such as clicking on a link, others can easily spread without user interaction. All that's necessary is for the computer worm to become active on an infected system. Once active, the worm can spread over a network through its internet or local area network.
ROOTKIT
INTRODUCTION
A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence.Root refers to the Admin account on Unix and Linux systems, and kit refers to the software components that implement the tool.
The way it spread out
Rootkits can spread through infected downloads like mobile phone apps. More targeted rootkit attacks use social engineering like phishing emails as an attack vector.
Consequences when it was infected
- System crashes
- Software Malfunctions
- Antivirus crash
Solution & Prevention
- Scan your systems
- Be careful of phishing attempts
- Update your software
- Use advanced antivirus/anti-malware:
TROJAN HORSE
Solution & Prevention
-
Use strong, unique passwords for all online accounts, as well as devices.
-
-
Use a password manager, which will automatically enter a saved password into a recognized site (but not a spoofed site).
-
INTRODUCTION
Type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.
The way it spread out
Trojans may be packaged in downloads for games, tools, apps or even software patches. Many Trojan attacks also leverage social engineering tactics, as well as spoofing and phishing, to prompt the desired action in the user.
BOTNETS
Solution & Prevention
A regular security awareness training program that teaches users/employees to identify malicious links.
Always keep your software updated to decrease the chances of a botnet attack exploiting weaknesses in the system.
Use two-factor authentication to prevent botnet malware from breaking into devices and accounts if a password has been compromised.
Update passwords across all devices, especially the privacy and security options on those that connect device-to-device or to the internet.
INTRODUCTION
A botnet is a network of computers infected with malware that are controlled by a bot herder. The bot herder is the person who operates the botnet infrastructure and uses the compromised computers to launch attacks designed to crash a target’s network, inject malware, harvest credentials or execute CPU-intensive tasks. Each individual device within the botnet network is called a bot.
The way it spread out
A bot herder intends for users to remain unaware of their exposure and eventual malware infection. They may exploit security issues in software or websites so that they can deliver malware through emails, drive-by downloads, or trojan horse downloads.
Consequences when it was infected
- exploit security issues in software or websites so that they can deliver malware through emails, drive-by downloads, or trojan horse downloads.