written 8.4 years ago by | modified 2.8 years ago by |
Subject: System Web Security
Topic: Software Security
Difficulty: High
written 8.4 years ago by | modified 2.8 years ago by |
Subject: System Web Security
Topic: Software Security
Difficulty: High
written 8.4 years ago by |
Malware regroups viruses, spyware, Trojans, and all sorts of small programs designed to harm your system, steal information, track your activities etc
The different types of malicious attacks are as follows:
A Trojan horse, commonly known as a “Trojan,” is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware.
A Trojan can give a malicious party remote access to an infected computer.
Once an attacker has access to an infected computer, it is possible for the attacker to steal data (logins, financial data, even electronic money), install more malware, modify files, monitor user activity (screen watching, key logging, etc), use the computer in botnets, and anonymise internet activity by the attacker.
Spyware is a type of malware that functions by spying on user activity without their knowledge.
These spying capabilities can include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
Spyware often has additional capabilities as well, ranging from modifying security settings of software or browsers to interfering with network connections.
Spyware spreads by exploiting software vulnerabilities, bundling itself with legitimate software, or in Trojans.
Adware (short for advertising-supported software) is a type of malware that automatically delivers advertisements.
Common examples of adware include pop-up ads on websites and advertisements that are displayed by software.
A rootkit is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
Once a rootkit has been installed it is possible for the malicious party behind the rootkit to remotely execute files, access/steal information, modify system configurations, alter software (especially any security software that could detect the rootkit), install concealed malware, or control the computer as part of a botnet.
A zombie computer, usually known in the short form zombie, is a computer attached to the Internet that has been compromised and manipulated without the knowledge of the computer owner.
A botnet refers to a network of zombie computers that have been taken over and put under the remote control of an attacker.