0% found this document useful (0 votes)
9 views3 pages

Spyware, Adware, Rootkit, Ransomeware, Worm, Trojan Horse, or Backdoor. - Backdoor - Spyware - Adware - Worm - Trojan Horse

The document discusses five types of malware: Backdoor, Spyware, Adware, Worm, and Trojan Horse, providing examples and descriptions for each. It also covers a cybersecurity attack on Barnes and Noble, detailing the article's title, author, publication date, and the impact of the attack on customers' personal information. Preventative measures and the company's response to the incident are also outlined.

Uploaded by

nigrosiadrian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views3 pages

Spyware, Adware, Rootkit, Ransomeware, Worm, Trojan Horse, or Backdoor. - Backdoor - Spyware - Adware - Worm - Trojan Horse

The document discusses five types of malware: Backdoor, Spyware, Adware, Worm, and Trojan Horse, providing examples and descriptions for each. It also covers a cybersecurity attack on Barnes and Noble, detailing the article's title, author, publication date, and the impact of the attack on customers' personal information. Preventative measures and the company's response to the incident are also outlined.

Uploaded by

nigrosiadrian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Part I

1. Select five (5) malware from the following: Spyware, Adware, Rootkit,
Ransomeware, Worm, Trojan Horse, or Backdoor.

-Backdoor
-Spyware
-Adware
-Worm
-Trojan Horse

2. Search two (2) examples for each of the five malware you have selected. Add
a short description for each. Cite your reference. (5 points per example)

-Backdoor
Operating system – This backdoor is usually secure, but it's an appealing
target. After all, it's easy to employ because it is intended to take control of a
machine remotely.

Application and Systems – This backdoor might have hidden backdoors installed
to achieve malicious goals.

5 Examples of a Backdoor - Simplicable

-Spyware
Infostealers - are programs that can scan infected computers and steal a variety
of personal information. This information can include browsing histories,
usernames, passwords, email addresses, personal documents, as well as media
files. Depending on the program, infostealers store the data they collect either on
a remote server or locally for later retrieval.

Password stealers - Password stealers are very similar to infostealers, the only
difference being that they are specially designed to steal login credentials from
infected devices.

What is Spyware? The 5 Examples You Need to Know (softwarelab.org)

-Adware
Gator - removes advertising from websites and replace it with its own ads. This
meant that if the visitors of a website click on an ad, all the profits would go
directly to Gator instead of the content creator.

Deskad - shows deceptive ads within your internet browser, redirects your traffic
to suspicious websites, and displays pop-up ads. Unlike other similar programs,
DeskAd
starts off very discreetly only to gradually take full control of your browser. That is
why it often goes unnoticed until the problem becomes so serious that only an
operating system reinstall can solve it.

What is Adware? The 5 Examples You Need to Know (softwarelab.org)

-Worm
Morris worm – this worm was one of the first computer worms to be
disseminated via the internet, as well as the first instance of self-replicating
harmful software.

Storm worm – while posing as a legitimate software, this worm incorporates


dangerous activities. It contains unique features such as a backdoor that allows
the controllers to get access to the machine and harvest email addresses in
order to propagate the infection further.

What is a Computer Worm? The 5 Examples You Need to Know (softwarelab.org)

-Trojan Horse
Trojan-Dropper - used to install Trojans and other viruses into the computer. This
can also conceal the detection of malicious programs. If you're using a weak or
outdated antivirus, some of them can't scan all of the components inside this type
of Trojan horse virus.

Trojan-DDoS - can start up the Denial of Service (DoS) attacks. Not only it can
affect endpoints, but also websites. By sending multiple requests from your
computer and several other infected computers the attack can overload the
target address which leads to a denial of service.

What is the Trojan Horse Virus | Types of Trojan Malware (comodo.com)

Part II

1. Search for an article regarding a cybersecurity attack using malware. The article
should be published between 2016 and 2020, by a credible source.

2. Answer the following items based on the article you found.

1. What is the title of the article? (3 points)


Barnes and Noble cyberattack exposed customers’ personal information

2. Who wrote the article? (3


points) Alexis Benveniste
3. When was the article published? (2
points) October 15, 2020

4. Give the link where you found the article. (2 points)


Barnes & Noble cyberattack exposed customers' personal information -
CNN

5. Is it possible to prevent this kind of attack? How? (Essay: 15 points)

Yes, installing/using trusted antivirus software, changing their account


passwords, educating employees on what they should and shouldn't
download/open, and creating effective email security policies can all help
to contain this kind of attack.

6. How extensive was the impact of the attack to the environment


where it happened? (Essay: 15 points)

Since the information the hackers have might be used to steal the
customer's identity and money, the data breach has a substantial
consequence. Hackers can also use this information to deceive others,
and knowing your personal information makes it easy for them to target
you.

7. How did the person/company, who was attacked, cope with the
consequences and effects of the incident? (Essay: 15 points)

When the online bookshop discovered their system had been hacked,
they notified all of their customers that they were under attack and that
their services would be unavailable for a short period of time. They always
keep their consumers up to date on certain details via online platforms
and have released an apology for any delays.

You might also like