INF-101 12/7/2023 (Computer Security)
Malware that makes a computer’s data inaccessible until a ransom is paid.
It invades a computer by a Trojan or worm.
It encrypts the victim’s data files.
It allows hackers to make changes to a computer’s operating system.
Meltdown and Spectre exploit the hardware’s vulnerability of microprocessors
A type of malware that hides in the system and is triggered each time you boot your computer. It allows a remote user to:
Install rogue files
Delete filles
Use and take control of your computer.
There are different types of rootkits:
Firmware or hardware
Bootloader
Memory
Virtual
A computer that has been secretly taken over by an outsider typically using a rootkit.
Botnet (Zombie army) - A group of compromised computers controlled by a hacker.
They’re used to transmit spam messages from different IP addresses.
DoS - Denial of Service
It’s an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.
DDoS - Distributed Denial of Service
It launches a virus on a computer.
It’s a software that collects information about your Internet surfing habits and behaviors.
A form of spyware that records all actions typed on a keyboard.
Can be used on phones
Can be hardware devices or software apps.
Can record passwords and confidential information
Specialized hardware or software that captures packets transmitted over a network.
There are two types of sniffers:
Legitimate sniffers - Used for routine examination and problem detection.
Unauthorized sniffers - Used to steal information.
Unsolicited e-mail message.
50% of emails sent daily are spam.
To solve this, use a spam filter.
Spam filter - A computer software designed to prevent spam messages from entering an user’s e-mail inbox.
The illegitimate use of an e-mail message that appears to be from an established organization such as a bank, financial institution, or insurance company.
These directs users to a fake website where they are asked to enter or update their information.
A type of phishing that seeks to obtain personal information through malicious software that is deposited on a victim’s computer.
Software that collects the user’s web browsing history. It tracks the types of websites you visit and provides customized ads based on your browsing behavior.
A small text file of information created by a website and stored by your web browser on your hard disk.
Malware that makes a computer’s data inaccessible until a ransom is paid.
It invades a computer by a Trojan or worm.
It encrypts the victim’s data files.
It allows hackers to make changes to a computer’s operating system.
Meltdown and Spectre exploit the hardware’s vulnerability of microprocessors
A type of malware that hides in the system and is triggered each time you boot your computer. It allows a remote user to:
Install rogue files
Delete filles
Use and take control of your computer.
There are different types of rootkits:
Firmware or hardware
Bootloader
Memory
Virtual
A computer that has been secretly taken over by an outsider typically using a rootkit.
Botnet (Zombie army) - A group of compromised computers controlled by a hacker.
They’re used to transmit spam messages from different IP addresses.
DoS - Denial of Service
It’s an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.
DDoS - Distributed Denial of Service
It launches a virus on a computer.
It’s a software that collects information about your Internet surfing habits and behaviors.
A form of spyware that records all actions typed on a keyboard.
Can be used on phones
Can be hardware devices or software apps.
Can record passwords and confidential information
Specialized hardware or software that captures packets transmitted over a network.
There are two types of sniffers:
Legitimate sniffers - Used for routine examination and problem detection.
Unauthorized sniffers - Used to steal information.
Unsolicited e-mail message.
50% of emails sent daily are spam.
To solve this, use a spam filter.
Spam filter - A computer software designed to prevent spam messages from entering an user’s e-mail inbox.
The illegitimate use of an e-mail message that appears to be from an established organization such as a bank, financial institution, or insurance company.
These directs users to a fake website where they are asked to enter or update their information.
A type of phishing that seeks to obtain personal information through malicious software that is deposited on a victim’s computer.
Software that collects the user’s web browsing history. It tracks the types of websites you visit and provides customized ads based on your browsing behavior.
A small text file of information created by a website and stored by your web browser on your hard disk.