Cyber and Network Security Unit 1
Cyber and Network Security Unit 1
Fileless Fileless malware is a type of malicious activity that uses native, legitimate
Malware tools built into a system to execute a cyber attack. Unlike traditional
malware, fileless malware does not require an attacker to install any code on
a target’s system, making it hard to detect.
Spyware Spyware is a type of unwanted, malicious software that infects a computer or
other device and collects information about a user’s web activity without
their knowledge or consent.
Adware Adware is a type of spyware
Type Description
Trojan It is a code that is malicious in nature and has the capacity to take control
of the computer. It is designed to steal, damage, or do some harmful
actions on the computer. It tries to deceive the user to load and execute
the files on the device. After it executes, this allows cybercriminals to
perform many actions on the user’s computer like deleting data from
files, modifying data from files, and more.
Worms A worm is a self-contained program that replicates itself and
spreads its copies to other computers. A worm may infect its
target through a software vulnerability or it may be delivered via
phishing or smishing. Embedded worms can modify and delete
files, inject more malicious software, or replicate in place until
the targeted system runs out of resources.
Rootkits Rootkit malware is a collection of software designed to give
malicious actors control of a computer network or application.
Once activated, the malicious program sets up a backdoor
exploit and may deliver additional malware. Bootkits take this a
Type Description
Mobile Mobile malware is any type of malware designed to target
Malware mobile devices. Mobile malware is delivered through malicious
downloads, operating system vulnerabilities, phishing, smishing,
and the use of unsecured WiFi.
SMiShing Smishing is the act of sending fraudulent text messages designed to trick
individuals into sharing sensitive data such as passwords, usernames and credit
card numbers. A smishing attack may involve cybercriminals pretending to be
your bank or a shipping service you use.
Vishing Vishing, a voice phishing attack, is the fraudulent use of phone calls and voice
messages pretending to be from a reputable organization to convince individuals
to reveal private information such as bank details and passwords.
4. Spoofing
Spoofing, as it pertains to cybersecurity, is when someone or
something pretends to be something else in an attempt to gain
our confidence, get access to our systems, steal data, steal
money, or spread malware. Spoofing attacks come in many
forms, including:
Email spoofing
Website and/or URL spoofing
Caller ID spoofing
Text message spoofing
GPS spoofing
Man-in-the-middle attacks
Extension spoofing
IP spoofing
Facial spoofing
4. Spoofing
5. Identity-based attacks
An identity-based attack is a type of cyber attack that targets
and compromises the digital identity of individuals and
organizations. In this type of attack, a cybercriminal tries to
steal, alter and misuse an individual’s identity-related
information such as their login credentials, domain names,
personal data or digital certificates.
Cybersecurity strikes
Information security strikes against
against Cyber crimes,
Attacks unauthorized access, disclosure
cyber frauds, and law
modification, and disruption.
enforcement.
Uses a range of
Relies on a variety of technologies, including
technologies, such as firewalls, encryption, access controls,
Technologies
antivirus software, and and data loss prevention
intrusion detection systems tools
Parameters CYBER SECURITY INFORMATION SECURITY