Please enable JavaScript.
Coggle requires JavaScript to display documents.
LO4.1 - types of threat - Coggle Diagram
LO4.1 - types of threat
malware
(malicious software) is installed on a computer system and collects information about users without their knowledge.
-
Rootkit
why is it used?
a rootkit is designed to remotely access or control a computer system without being detected by security software or the user.
how it works?
an installed rootkit can enable a cyber attack to remotely access files , access/steal data and information , modify software configurations or control the computer system as part of a bonnet.
how to mitigate effects?
-
software updates , keeping security software up to date and not downloading suspicious files are the only ways of trying to avoid a rootkit from being installed.
Bot
-
how it works?
allows a cyber security attacker to take control of an infected computer system without the users knowledge.
how to mitigate effects?
install, run and keep software security package.
-
-
ransomware
why is it used?
ransomware holds a computer system captive and demands a ransom , usually money, to release it.
how it works?
-
a message is usually displayed to force the user to pay so that the restrictions ca be lifted and the user given back access to data or computer system. it is spread like a worm.
-
adware
-
how it works?
automatically shows adverts such as pop ups. It may also be in the user interface of a software package or on an installation screen. adware by itself , its harmless ;however some adware may include spyware such as key loggers.
how to mitigate effects?
install, run and keep updated security software package.
-
-
spyware
why is it used?
spy ware can collec data from an infected computer , including perosnal information like websites visited , user logins and financial information
how it is used?
hidden from a user and can be difficult to detect. its often secretly installed on a users personal computer without their knowledge. some spyware such as key loggers may be installed to monitor usres.
can also install additional software or redirect web browsers to different websites. spy ware can change computer settings , which could lead to slow internet connection or change web browser settings.
-
botnet
-
this then allows the botnet , the person who created it, to take control of the computer system.
bug
-
how it works?
usually the result of human error during the coding of the software. most bugs can be fixed by the software creator issuing a fix or patch.
security bugs are most severe type and can allow cyber attackers , to bypass user authentcation, override access privileges or steal data.
-