Akaki Polytechnic College Group - 4: Uc-Rootkit Virus
Akaki Polytechnic College Group - 4: Uc-Rootkit Virus
GROUP -4
UC- ROOTKIT VIRUS
NO NAME
1 BEZAWIT TASACHEW
2 MEKDES DERESE
3 MEGERTU GOSOO
4 MERAWIT KAHSAY
5 MULUGETA MAMO
6 SELAM YIBELTAL
A computer virus
-is a type of malicious software that can replicate itself and spread to other
computers or devices.
-it is designed to cause harm to the system by corrupting data, stealing personal
information. Etc...
- Viruses can be transmitted through infected files, email attachments, or
malicious websites.
Potential damage
Computer viruses can cause a wide range of damage, including data loss, system
crashes, identity theft, and financial loss. In some cases, viruses can also be used
to create botnets or launch large-scale cyber-attacks. (Botnets are basically
networks of computers that have been infected with malware and are controlled
by one person, often called a "bot herder" or "botmaster." These infected
computers, also known as "zombies," can be used to carry out big cyber-attacks
like DDoS attacks, spam campaigns, and other bad stuff.
Basically, viruses and other types of malware can infect a bunch of computers and
create a botnet. Once a botnet is set up, the botmaster can control the infected
computers from afar and launch coordinated attacks without the owners even
knowing. This is a major threat to cybersecurity because botnets can cause a lot
of damage to individuals, organizations, and even whole countries.)
Preventive methods
-To protect against computer viruses, it's important to use antivirus software and
keep it up to date. Additionally, users should be cautious when downloading files
or clicking on links from unknown sources, and they should regularly update their
operating system and software to patch any security vulnerabilities. Practicing
safe browsing habits and being mindful of email attachments and links can also
help prevent virus infections.
Rootkit virus
-A rootkit is a harmful software that sneaks into a computer system without
permission and stays hidden. It can be used to conceal other harmful programs,
(For example the use of a rootkit to hide a key logger).
-A key logger is a type of malware that records every keystroke made by a user,
including sensitive information such as usernames, passwords, credit card
numbers, and other personal data, steal important information, or control the
infected system from afar.
-These rootkits are usually made by cybercriminals, hackers, or other people with
bad intentions. They can be used to steal personal data, financial information, or
confidential business secrets.
Rootkit virus can be damage severe causes
- It can result in data theft, financial harm, system instability, and unauthorized
access to sensitive information. Rootkits are also tough to detect and remove,
which makes them a serious threat to computer security.
Does a rootkit serve a purpose?
-Rootkits can be useful in certain situations, such as for diagnostic and
troubleshooting purposes by software developers and cybersecurity
professionals. They allow access to the operating system at a low level to detect
and fix security vulnerabilities or system issues. Law enforcement and intelligence
agencies also use rootkits for surveillance and monitoring with legal authorization
to gather information about criminal activities or national security threats.
However, “rootkit" is commonly associated with malicious software used by
cybercriminals to conceal unauthorized access, malware, or other malicious
activities on a computer system. These rootkits are used to avoid detection and
maintain control over compromised systems for illegal purposes such as data
theft, financial fraud, espionage, and other cybercrimes.