Uploaded by Purge Ghost

Computer

advertisement
1.

Digital Security Risks
- is any event or action that could cause a loss of or damage to computer or mobile
device hardware, software, data, information or processing capability.
Examples of Digital Security Risks:

1. Computer viruses – are pieces of software that are designed to be spread from
one computer to another.
2. Rogue security software – is malicious software that mislead users to believe
there is a computer virus installed on their computer or that their security
measures are not up to date.
3. Trojan Horse – refers to tricking someone into inviting an attacker into a securely
protected area.
4. Computer worms – are pieces of malware programs that replicate quickly and
spread from one computer to another.
5. Dos attack – is performed by one machine and its internet connection, by flooding
a website with packets and making it impossible for legitimate users to access the
content of flooded website.
Cybercriminals
- Include members of extremist and radical groups at both ends of the political
spectrum who use the Internet to spread propaganda, attack the Web sites and
networks of their political enemies, steal money to fund their militant activities, or
plan and coordinate “real-world” crimes.
Examples of Cybercriminals:

1. Phishing scams – is a practice of a cybercriminal or hacker attempting to obtain
sensitive or personal information from a computer user.
2. Online Harassment – can consist of threats sent through email, instant message or
through a social network message or post.
3. Cyberstalking – is also known to continually harass their potential victims/
4. Invasion of Privacy – is basically the act of someone attempting to intrude on a
person’s personal life.
5. Identity theft – occurs when someone uses your personal identifying information and
pretends to be you in order to commit fraud or to gain other financial benefits.
Malware
- Is a blanket term for viruses, worms, trojans, and other harmful computer programs
hackers use to wreak destruction and gain access to sensitive information.
- Is based on its intended use, rather than a particular technique or technology used to
build it.
Examples of Malware
1. Virus – are designed to damage he target computer or device by corrupting data,
reformatting your hard disk, or completely shutting down your system.

2. Worm – spread over computer networks by exploiting operating system
vulnerabilities.
3. Adware – is often known for being an aggressive advertising software tat puts
unwanted advertising on your computer screen.
4. Ransomware – is a type of malware that holds your data captive and demands
payment to release the data back to you.
5. Spyware – is designed to track your browsing habits and internet activity.
Botnets
- Are a collection of internet-connected devices infected by malware that allow hackers
to control them.
- It is used to instigate botnet attacks, which include malicious activities.
Examples of Botnet

1. Distributed Denial of Service (DDoS) – cause unplanned application downtime.
2. Validating lists of leaked credentials – leading to account takeovers.
3. Web application – attacks to steal data.
4. Providing an attacker access to a device and its connection to a network.
Spoofing
Is when someone or something pretends to be something else in an attempt to
gain our confidence, get access to our systems, steal data, steal money, or spread
malware.
Spoofing attacks come in many forms, primarily:

1. Email spoofing
2. Website and/or URL spoofing
3. Caller ID spoofing
4. GPS spoofing
5. Man-in-the-middle attacks
Denial of service attacks
- Is an attack meant to shut down a machine or network, making it inaccessible to its
intended users. DoS attacks accomplish this by flooding the target with traffic, or
sending it information that triggers a crash.
Popular flood attacks

1. Buffer overflow attacks – the concept is to send more traffic to a network address
than the programmers have built the system to handle.
2. ICMP Flood – leverages misconfigured network devices by sending spoofed packets
that ping every computer on the targeted network, instead of just one specific
machine.
3. SYN flood – sends a request to connect to a server, but never completes the
handshake.
Back doors
- Is a malicious code which, by exploiting system flaws and vulnerabilities, is used to
facilitate remote unauthorized access to a computer system or program.
Examples of Back doors:
1. Cryptojacking malware is designed to use your system's resources to mine
cryptocurrency. In short, every time someone exchanges cryptocurrency the
transaction is recorded on an encrypted virtual ledger known as the blockchain.
2.
Download