knowt logo

INF-101 12/7/2023 (Computer Security)

Ransomware

  • Malware that makes a computer’s data inaccessible until a ransom is paid.

  • It invades a computer by a Trojan or worm.

  • It encrypts the victim’s data files.

Spectre and Meltdown

  • It allows hackers to make changes to a computer’s operating system.

  • Meltdown and Spectre exploit the hardware’s vulnerability of microprocessors

Rootkits

  • A type of malware that hides in the system and is triggered each time you boot your computer. It allows a remote user to:

    • Install rogue files

    • Delete filles

    • Use and take control of your computer.

  • There are different types of rootkits:

    • Firmware or hardware

    • Bootloader

    • Memory

    • Virtual

Zombies

  • A computer that has been secretly taken over by an outsider typically using a rootkit.

  • Botnet (Zombie army) - A group of compromised computers controlled by a hacker.

  • They’re used to transmit spam messages from different IP addresses.

DoS and DDoS Attacks

  • DoS - Denial of Service

  • It’s an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.

  • DDoS - Distributed Denial of Service

  • It launches a virus on a computer.

Spyware

  • It’s a software that collects information about your Internet surfing habits and behaviors.

Keystroke Loggers

  • A form of spyware that records all actions typed on a keyboard.

    • Can be used on phones

    • Can be hardware devices or software apps.

    • Can record passwords and confidential information

Packet Sniffers

  • Specialized hardware or software that captures packets transmitted over a network.

  • There are two types of sniffers:

    • Legitimate sniffers - Used for routine examination and problem detection.

    • Unauthorized sniffers - Used to steal information.

Online Nuisances

Spam

  • Unsolicited e-mail message.

  • 50% of emails sent daily are spam.

  • To solve this, use a spam filter.

  • Spam filter - A computer software designed to prevent spam messages from entering an user’s e-mail inbox.

Phishing

  • The illegitimate use of an e-mail message that appears to be from an established organization such as a bank, financial institution, or insurance company.

  • These directs users to a fake website where they are asked to enter or update their information.

Pharming

  • A type of phishing that seeks to obtain personal information through malicious software that is deposited on a victim’s computer.

Adware

  • Software that collects the user’s web browsing history. It tracks the types of websites you visit and provides customized ads based on your browsing behavior.

Cookies

  • A small text file of information created by a website and stored by your web browser on your hard disk.

HC

INF-101 12/7/2023 (Computer Security)

Ransomware

  • Malware that makes a computer’s data inaccessible until a ransom is paid.

  • It invades a computer by a Trojan or worm.

  • It encrypts the victim’s data files.

Spectre and Meltdown

  • It allows hackers to make changes to a computer’s operating system.

  • Meltdown and Spectre exploit the hardware’s vulnerability of microprocessors

Rootkits

  • A type of malware that hides in the system and is triggered each time you boot your computer. It allows a remote user to:

    • Install rogue files

    • Delete filles

    • Use and take control of your computer.

  • There are different types of rootkits:

    • Firmware or hardware

    • Bootloader

    • Memory

    • Virtual

Zombies

  • A computer that has been secretly taken over by an outsider typically using a rootkit.

  • Botnet (Zombie army) - A group of compromised computers controlled by a hacker.

  • They’re used to transmit spam messages from different IP addresses.

DoS and DDoS Attacks

  • DoS - Denial of Service

  • It’s an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.

  • DDoS - Distributed Denial of Service

  • It launches a virus on a computer.

Spyware

  • It’s a software that collects information about your Internet surfing habits and behaviors.

Keystroke Loggers

  • A form of spyware that records all actions typed on a keyboard.

    • Can be used on phones

    • Can be hardware devices or software apps.

    • Can record passwords and confidential information

Packet Sniffers

  • Specialized hardware or software that captures packets transmitted over a network.

  • There are two types of sniffers:

    • Legitimate sniffers - Used for routine examination and problem detection.

    • Unauthorized sniffers - Used to steal information.

Online Nuisances

Spam

  • Unsolicited e-mail message.

  • 50% of emails sent daily are spam.

  • To solve this, use a spam filter.

  • Spam filter - A computer software designed to prevent spam messages from entering an user’s e-mail inbox.

Phishing

  • The illegitimate use of an e-mail message that appears to be from an established organization such as a bank, financial institution, or insurance company.

  • These directs users to a fake website where they are asked to enter or update their information.

Pharming

  • A type of phishing that seeks to obtain personal information through malicious software that is deposited on a victim’s computer.

Adware

  • Software that collects the user’s web browsing history. It tracks the types of websites you visit and provides customized ads based on your browsing behavior.

Cookies

  • A small text file of information created by a website and stored by your web browser on your hard disk.

robot