Types of
Cyber threats - Malwares
1.
Rootkit- is a collection of computer software,
typically malicious, designed to enable access to a computer or an area of its
software that is not otherwise allowed and often masks its existence or the
existence of other software.
2.
Spyware- is a
software that aims to gather information about a person or organization,
without their knowledge, and send such information to another entity without
the consumer's consent.
3.
Trojan- is any
malware which misleads users of its true intent.
4.
Virus- is a type of computer program that,
when executed, replicates itself by modifying other computer programs and
inserting its own code.
5. worm- is a
standalone malware computer program that replicates itself in order to spread
to other computers.
6. ADWARE- is
software that generates revenue for its developer by automatically generating
online advertisements in the user interface of the software or on a screen
presented to the user during the installation process.
7. LOGIC BOMBS- is a piece
of code intentionally inserted into a software system that will set off a
malicious function when specified conditions are met.
8. Rogue security software- is a form
of malicious software and internet fraud that misleads users into believing
there is a virus on their computer and aims to convince them to pay for a fake
malware removal tool that actually installs malware on their computer.
Types of
cyber attacks
1.PHISHING- is the fraudulent attempt to obtain sensitive
information such as usernames, passwords and credit card details by disguising
oneself as a trustworthy entity in an electronic communication.
2.CRACKING- - in cryptanalysis and computer security,
password cracking is the process of recovering passwords from data that have
been stored in or transmitted by a computer system.
3.MAN IN THE MIDDLE- is an attack where the attacker secretly
relays and possibly alters the communications between two parties who believe
that they are directly communicating with each other.
4.Drive-by DOWNLOAD -is the unintended
download of computer software from the internet.
5.BACKDOORS - is a typically covert method of bypassing normal authentication or encryption in a computer,product,embedded device on its embodim.
6.DNS poisoning- is a form of
computer security hacking in which corrupt domain name system data is introduced into the DNS resolver's cache, causing the name server to return an
incorrect result record.
7.Clickjacking- is a malicious technique of tricking a user
into clicking on something different from what the user perceives, thus
potentially revealing confidential information or allowing others to take
control of their computer while clicking on seemingly innocuous objects, including web pages.
8.Malvertising is
the use of online advertising to spread malware.
9.Code injectionis the exploitation of a computer bug that is
caused by processing invalid data. Injection is used by an attacker to
introduce code into a vulnerable computer program and change the course of execution.
10.Sniffing is the theft or interception of data by capturing the network traffic using a sniffer buffer overflows.
11.The Denial of Service Attack is a cyber-attack in which the perpetrator seeks to make a
machine or network resource unavailable to its intended users by temporarily or
indefinitely disrupting services of a host connected to the internet.
Very informative
ReplyDeleteVery good
ReplyDeleteVery good
ReplyDeleteMarvelous
ReplyDeleteVery suparp
ReplyDeleteVery good
ReplyDeleteVery nice
ReplyDeleteAwesome π
ReplyDeleteGreatπππ
ReplyDeleteVery good...
ReplyDeleteInformative ππ»
ReplyDeleteVery nice
ReplyDeleteGood one
ReplyDeleteVerry good
ReplyDeleteGood
ReplyDeleteNice one
ReplyDeleteππππ
ReplyDeleteDidn't know about many if these..
ReplyDeleteExcellent
ReplyDeleteIt is.. very useful
ReplyDeleteGood effort by the group
ReplyDeleteNever knew this much about cyber crime
ReplyDeleteGood explanation
ReplyDeleteVery informativs
ReplyDeleteInformative
ReplyDeleteVery useful
ReplyDelete