Please enable JavaScript.
Coggle requires JavaScript to display documents.
Malicious Software and Attack Vendors - Coggle Diagram
Malicious Software and Attack Vendors
Viruses
- An executable program that attaches itself to or infects other executable programs and them replicates to infect other programs.
File Infectors
Data infectors
System infectors
Rootkits
- modifies or replace one of more existing programs to hide the fact that a computer has been compromised.
Ransomware
- Attempts to generate funds directly from a computer user and is one of the fastest-growing menaces. Attacks a computer or device and limits the user's ability to access important data.
Spam
- sends new type of viruses and is high in volume.
Worms
- self-contained programs designed to propagate form one host machines to another using the host's own network communications protocols. Does not require a host program to survive and replicate.
Trojan Horse
- any programs that masquerades as a useful program while hiding its malicious intent.
Logic Bombs
- program that executes a malicious function of some kid when it detects certain conditions. Then it activates and carries out its taks
Injections
- when malicious software provides deliberately invalid input to some other software to cause an error condition or some state that allows an attack to occur.
Cross-Site scripting
SQL injection
Lightweight directory access Protocol
Extensible Markup Language
Command Injection
Botnets
- they infect vulnerable machines with gents that perform various functions t the command of the controller.
Denial of Service
- Crashes a server or network device or creates so much network congestion that the user cannot access it.
SYN Flood Attacks
Smurf Attacks
Spyware
- installs itself on a user's computer and collects information about the user's browsing habits and activities.
Adware
- triggers popup ads and banners on certain websites. Also collects and tracks info about application, website and internet activity
Phising
- Tricks users into providing logon info or what appears to be a legitimate website but it is actually set up to collect info.
Spear Phising
Pharming
Keystroke Loggers
- captures keystrokes or user entries which enable the attacker to get log in or banking info.
Hoaxes and Myths
Homepage hijacking
Web Defacements
- Gaining unauthorized access to a web server nd altering the index page of a site on the server.