Malware is software designed to secretly access your computer. Malware includes viruses, worms, Trojans, rootkits, spyware, ect.
A payload is malware caused by a virus or other malicious code executed by the exploit on the target computer. It may move, alter, overwrite, delete file, or commit other destructive activity.
A virus is a self-copying program that overwrites storage.
EX: A boot sector virus. The boot sector is a portion of storage set aside for start-up.
A worm spreads across networks automatically.
A zombie takes remote control of a victim PC. A collection of zombies (thousands or millions) make up a botnet, which 1 person or 1 group controls. The botnet launches a DDOS (distributed denial of service) attack. In a DDOS attack, hackers send tons of pings to a server so that legitimate users can not access the service (website).
Trojans are malware, often sent through email/web links that offer attractive objects, then infect the computer with a virus (software).
Ping- a network utility
Logic bombs execute under a given condition.
Time bombs are triggered by a date.
Root kits change the system software, making the attack invisible.
Keylogger ( keystroke logging) is the action of tracking (or loggin) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their action are being monitored.
Backdoor- A logon not using normal program. A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device.
Phishing is the act of getting data by asking for it (email). This is not malware, it is a method. Whaling is the targeting (phishing) of CISOs (Chief Information Security Officer) or other highly level people.
Social engineering is talking people into giving away information.
Type 2 – “Bad Things that can happen to you (vandalism, network intrusion, data theft, identity theft)
Examples of assets are software, processing; valuable data (ex. Ssn). Bandwidth
Threat agents are the cause of the threat (attack).
The Exploit is the means of the attack.
Safe Mode – When windows boots up in a minimal amount of devices
Disk Operating System (DOS) is an operating system. The cmd prompt screen is an example of DOS.
Intrusion Detection System (security), is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet
Type 1 – “Bad Things Out There”
Malware is software designed to secretly access your computer. Malware includes viruses, worms, Trojans, rootkits, spyware, ect.
A payload is malware caused by a virus or other malicious code executed by the exploit on the target computer. It may move, alter, overwrite, delete file, or commit other destructive activity.
A virus is a self-copying program that overwrites storage.
EX: A boot sector virus. The boot sector is a portion of storage set aside for start-up.
A worm spreads across networks automatically.
A zombie takes remote control of a victim PC. A collection of zombies (thousands or millions) make up a botnet, which 1 person or 1 group controls. The botnet launches a DDOS (distributed denial of service) attack. In a DDOS attack, hackers send tons of pings to a server so that legitimate users can not access the service (website).
Trojans are malware, often sent through email/web links that offer attractive objects, then infect the computer with a virus (software).
Ping- a network utility
Logic bombs execute under a given condition.
Time bombs are triggered by a date.
Root kits change the system software, making the attack invisible.
Keylogger ( keystroke logging) is the action of tracking (or loggin) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their action are being monitored.
Backdoor- A logon not using normal program.
A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device.
Phishing is the act of getting data by asking for it (email). This is not malware, it is a method. Whaling is the targeting (phishing) of CISOs (Chief Information Security Officer) or other highly level people.
Social engineering is talking people into giving away information.
Type 2 – “Bad Things that can happen to you (vandalism, network intrusion, data theft, identity theft)
Examples of assets are software, processing; valuable data (ex. Ssn). Bandwidth
Threat agents are the cause of the threat (attack).
The Exploit is the means of the attack.
Safe Mode – When windows boots up in a minimal amount of devices
BIOS- Basic Input Output System
5 Devices
I→P(processing)→O
Storage
Communciation
Information Systems: Hardware, Software (bugs), Information, People, Procedures
Disk Operating System (DOS) is an operating system. The cmd prompt screen is an example of DOS.
Intrusion Detection System (security), is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet