1 / 0

NAME THAT MALWARE

NAME THAT MALWARE. Bot. An automated software program that executes certain commands when it receives a specific set of directions. Spyware. A software program that aids in gathering information about a person or organization without their knowledge and without advertisements. Web Bug.

africa
Télécharger la présentation

NAME THAT MALWARE

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NAME THAT MALWARE

  2. Bot An automated software program that executes certain commands when it receives a specific set of directions.
  3. Spyware A software program that aids in gathering information about a person or organization without their knowledge and without advertisements.
  4. Web Bug A small transparent image that is placed in a web page or e-mail that usually creates a cookie on your computer, to allow others to know if you have visited the web page or opened the e-mail.
  5. Cookie A small piece of data sent from a website and stored by a user’s web browser to track the user’s activity on different websites and to create a profile of the user’s behavior.
  6. Adware A software program intended for marketing purposes to deliver and display advertisements.
  7. Key Logger A special kind of malware that records the keyboard and/or mouse activity on a PC and relays the information over the Internet to someone wishing to record passwords or other personal information.
  8. Hoaxes A software program masked in a seemingly legitimate message often causing the end user to readily distribute it. Examples include emails or text messages asking a person to look at a cute or funny picture or take a personality quiz.
  9. Scareware A software program that claims your computer or mobile device is infected and offers to clean it for a fee or tries to get you to click a link to fit it. This link installs malware.
  10. Ransomware A software program which after infecting a computer blocks or deletes information, or blocks us of the computer and demands payment and threatens to wipe out your files if you don't pay. In some cases, the warning is fake and there is no danger to the computer.
  11. Back Door An attacker finds an undocumented way of bypassing normal security mechanisms to secretly control a program, computer or network. Alternatively, the attacker could install a back door after getting access by other means.
  12. Password Cracker Process of recovering passwords from data that have been stored in or transmitted by a computer system.
  13. Denial of Service (DoS) 1000’s of people going to same website at same time. An attacker attempts to prevent legitimate users from accessing information or services, by targeting your computer and its network connection, or the computers and network of the sites you are trying to use.
  14. Distributed Denial of Service (DDoS) through Zombies An attacker uses a large number of computers, often taken over as bots, to prevent legitimate users from accessing information or services. The computers that are “taken over” are called zombies.
  15. Spoofing Users looking for a legitimate site instead get redirected or arrive at the attacker site which looks like the real one.
  16. Spamming Electronic messaging systems sending unsolicited bulk messages, especially advertising, indiscriminately.
  17. Sniffing A software program that captures all packets traversing the network regardless of destination showing all the data going by, including passwords, data inside files, and screens full of sensitive and private communications.
  18. Social Engineering A non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.
  19. Phishing Sending electronic communication attempting to acquire information such as usernames, passwords, and credit card details by falsely claiming to be an established legitimate enterprise.
  20. Vhishing We're confirming you've signed up for the new app. You will be charged $2/day unless you cancel your order by calling ###.###.#### immediately to decline the order. Sending electronic communication asking person to call thereby attempting to acquire information such as usernames, passwords, and credit card details by falsely claiming to be an established legitimate enterprise.
  21. Pharming We're confirming you've signed up for the new app. You will be charged $2/day unless you go to this website www.### immediately to decline the order. Software program that redirects the browser to an attacker’s fake version of the web site. A technical means of redirecting or tricking a user is augmenting a spoofed site or email attack.
  22. Drive-by-Download The automatic download of software to a user’s computer triggered simply by visiting a Web site or viewing an HTML formatted email. The download occurs without the user’s consent and often without any notice at all.
  23. Virus A self-replicating program that spread by inserting copies of itself into programs or documents that already existed on a computer and using the functions of the existing programs to rapidly reproduce many copies of itself. Needs a person to replicate itself; a person to open up an attachment for example.
  24. Worm Worms spread from computer to computer, but unlike a virus, it has the ability to travel without any help from a person.
  25. Trojan The term "Trojan horse" often shortened to just "trojan" is applied to malware that pretends to be a legitimate program but is in reality is a malicious application. It may simply pretend to be a useful program or it may actually contain a useful function as cover for a destructive one.
More Related