Spyware, Adware, Rootkit, Ransomeware, Worm, Trojan Horse, or Backdoor. - Backdoor - Spyware - Adware - Worm - Trojan Horse
Spyware, Adware, Rootkit, Ransomeware, Worm, Trojan Horse, or Backdoor. - Backdoor - Spyware - Adware - Worm - Trojan Horse
1. Select five (5) malware from the following: Spyware, Adware, Rootkit,
Ransomeware, Worm, Trojan Horse, or Backdoor.
-Backdoor
-Spyware
-Adware
-Worm
-Trojan Horse
2. Search two (2) examples for each of the five malware you have selected. Add
a short description for each. Cite your reference. (5 points per example)
-Backdoor
Operating system – This backdoor is usually secure, but it's an appealing
target. After all, it's easy to employ because it is intended to take control of a
machine remotely.
Application and Systems – This backdoor might have hidden backdoors installed
to achieve malicious goals.
-Spyware
Infostealers - are programs that can scan infected computers and steal a variety
of personal information. This information can include browsing histories,
usernames, passwords, email addresses, personal documents, as well as media
files. Depending on the program, infostealers store the data they collect either on
a remote server or locally for later retrieval.
Password stealers - Password stealers are very similar to infostealers, the only
difference being that they are specially designed to steal login credentials from
infected devices.
-Adware
Gator - removes advertising from websites and replace it with its own ads. This
meant that if the visitors of a website click on an ad, all the profits would go
directly to Gator instead of the content creator.
Deskad - shows deceptive ads within your internet browser, redirects your traffic
to suspicious websites, and displays pop-up ads. Unlike other similar programs,
DeskAd
starts off very discreetly only to gradually take full control of your browser. That is
why it often goes unnoticed until the problem becomes so serious that only an
operating system reinstall can solve it.
-Worm
Morris worm – this worm was one of the first computer worms to be
disseminated via the internet, as well as the first instance of self-replicating
harmful software.
-Trojan Horse
Trojan-Dropper - used to install Trojans and other viruses into the computer. This
can also conceal the detection of malicious programs. If you're using a weak or
outdated antivirus, some of them can't scan all of the components inside this type
of Trojan horse virus.
Trojan-DDoS - can start up the Denial of Service (DoS) attacks. Not only it can
affect endpoints, but also websites. By sending multiple requests from your
computer and several other infected computers the attack can overload the
target address which leads to a denial of service.
Part II
1. Search for an article regarding a cybersecurity attack using malware. The article
should be published between 2016 and 2020, by a credible source.
Since the information the hackers have might be used to steal the
customer's identity and money, the data breach has a substantial
consequence. Hackers can also use this information to deceive others,
and knowing your personal information makes it easy for them to target
you.
7. How did the person/company, who was attacked, cope with the
consequences and effects of the incident? (Essay: 15 points)
When the online bookshop discovered their system had been hacked,
they notified all of their customers that they were under attack and that
their services would be unavailable for a short period of time. They always
keep their consumers up to date on certain details via online platforms
and have released an apology for any delays.