Please enable JavaScript.
Coggle requires JavaScript to display documents.
GROUP 1: MALICIOUS CODE & SOFTWARE, TYPES OF MCS, REAL-LIFE EXAMPLE,…
-
TYPES OF MCS
-VIRUSES-
Malicious programs that attach themselves to files and spread when those files are shared.
-
-TROJANS-
Disguised as legitimate software but secretly perform malicious activities, such as stealing data or opening a backdoor.
-WORM-
Standalone programs that replicate themselves and spread across networks without needing to attach to files.
-
-
A global ransomware attack that affected hundreds of thousands of computers, encrypting data and demanding ransom payments in Bitcoin.
A cyberattack that exploited vulnerabilities in the company's software, leading to the theft of personal data for over 147 million people.