Revision

Malware part 2

Spyware is installed to watch what is being typed and used and steals this data.

It uses monitoring through webcam and/or screen to gather bank details, passwords and other personal information.

It is hidden from view and criminals can then use the data to steal money and/or someone's identity,

Worms do not need to attach themselves to a file but can spread itself.

The worm located vulnerabilities on a PC so it can exploit it. Once on a computer system it can modify files to aid the criminal (such as ransomware).

Worms can replicate themselves, for example emailing everyone in someone's contact list with the infected file attached.

Virus, when executed, replicates itself by modifying other computer programs and inserting its own code.

It will attach to a file, like a spreadsheet, and everytime the spreadsheet runs, so will the virus.

They are often used to cause damage from a distance to many computers and also personal data, leading to theft of money and identity.

Malware part 1

click to edit

Malware short for malicious software and is designed to harm your computer system in some way.

DDoS is an attack on a website by computers loading the website multiple times and making it crash.

Because systems are not available to customers it will cause the company to lose money.

It requires fewer resources than other attacks and is easy to do. People may demand money in exchange for stopping the attack.

Trojan Horse carries in malicious software, disguised inside the trojan horse.

They also can be known to create a ‘backdoor’, a way of more malware infecting the computer, bypassing security.

Malware hidden in the trojan horse could be any of the following:

Adware makes pop-up ads that appear without being able to stop them, usually leading to social engineering scams.

Adware is also capable of replacing elements of your webpage.

The criminal uses adware to disable anti-malware software and can also be

Social Engineering

click to edit

This is the art of manipulating/tricking people so that confidential information can be found out.

Phishing This is where they will try and get you to input confidential information into a fake email.

Shoulder Surfing This is where someone’s personal information is seen by the attacker. This could be in a Coffee Shop, at a Cash Machine or in a workplace.

Blagging When someone uses an invented scenario in order to persuade someone to share information.

Name Generator Attacks When someone uses an invented scenario in order to persuade someone to share information

mitigation

click to edit

Prevent the malware in the following ways:

Protect the computer system:

Download security software from a reliable company.

Set software to automatically update.

Encryption your data so no-one can view it even if they steal it.

Secure backup in case the worst happens.

Firewalls checks incoming/outcoming network traffic.

Only open emails & attachments from people you trust.

Don’t click on suspicious links or pop-ups.

Only download software from trusted sites.