Please enable JavaScript.
Coggle requires JavaScript to display documents.
Revision - Coggle Diagram
Revision
Malware part 2
-
It uses monitoring through webcam and/or screen to gather bank details, passwords and other personal information.
It is hidden from view and criminals can then use the data to steal money and/or someone's identity,
-
The worm located vulnerabilities on a PC so it can exploit it. Once on a computer system it can modify files to aid the criminal (such as ransomware).
Worms can replicate themselves, for example emailing everyone in someone's contact list with the infected file attached.
Virus, when executed, replicates itself by modifying other computer programs and inserting its own code.
It will attach to a file, like a spreadsheet, and everytime the spreadsheet runs, so will the virus.
They are often used to cause damage from a distance to many computers and also personal data, leading to theft of money and identity.
Malware part 1
-
-
-
It requires fewer resources than other attacks and is easy to do. People may demand money in exchange for stopping the attack.
Trojan Horse carries in malicious software, disguised inside the trojan horse.
They also can be known to create a ‘backdoor’, a way of more malware infecting the computer, bypassing security.
-
Adware makes pop-up ads that appear without being able to stop them, usually leading to social engineering scams.
-
-
Social Engineering
-
Phishing This is where they will try and get you to input confidential information into a fake email.
Shoulder Surfing This is where someone’s personal information is seen by the attacker. This could be in a Coffee Shop, at a Cash Machine or in a workplace.
-
Name Generator Attacks When someone uses an invented scenario in order to persuade someone to share information
-