CNC - Malware (Lesson)
Malware
Introduction
A virus makes a human sick and a virus is one type of malware that makes a computer sick. Malware is short for malicious software. The malware program delivers the sickness to your computer when infected files, programs or emails are opened by the user of the computer. There are many different types of malware, but in general, malware steals, mutilates, corrupts, or redirects data, files, and programs on the computer.
Below are different types of malware.
Name |
Defining Information |
---|---|
Adware |
Software advertising products that pop-up on your computer when you visit a website or come bundled with free software, loading to the computer with the software. |
Bot |
A software program that hides on the computer and performs operations designated by others unbeknownst to you, even attacking other computers or networks using repetitious operations. |
Keylogging |
The use of a program to record every keystroke made by a compute user in order to gain fraudulent access to passwords and other confidential information. |
Ransomware |
Holds a computer hostage waiting for the computer owner to pay to remove their controls from your computer. |
Rootkit |
Allows for remote control or access to your computer by an unknown person. This malware is great at hiding its presence and is very hard to remove. A rootkit could access or modify files, change information or access, allow or install more malware, and even change the configuration settings of your computer. |
Spyware |
This software monitors the activity on the computer, even knowing what is typed and may interfere with browsers or other communications. By attaching itself to legitimate or other virus types, it duplicates and spreads. |
Trojan Horse |
This appears to be a normal file which the user is interested in. When downloaded it provides remote access to the computer to an unknown user, and can steal data, logins, monitor activities, and run bots. |
Virus |
These can do many things including create advertisements, bots, steal information and more. A virus will copy itself and attach itself to other good items to be transferred along to others when copied code is executed on other computers. |
Worm |
Operating system weaknesses are used with these. They duplicate, using up processing power. |
Other Security Issues
The attacks below are examples of the impact that is caused by the malware above. Bots on computers are waiting for instructions from their owners, not the computer's owners and can work to interrupt or destroy legitimate computer operations.
Internet of Things
Today, the internet has expanded to include more things than just what we think of as a computer. It includes our things, because our things are becoming increasingly connected wirelessly to other things and our phones.
Using our phones with an internet based security system, we are able to turn off lights in the house, answer the doorbell and visually see who is at the door at our house while we are away at work or elsewhere. Security cameras stream information from within our house allowing us to see what even our dog is doing. Refrigerators, wearable technology, cars and more are becoming increasing connected to the internet.
As connectivity increases so does options for security, both to keep items secure as well as locating and monitoring objects or people. From the basic RFID (radio frequency identification tags) to the wearable Bluetooth devices that call for help (used heavily by elderly living alone), our world is becoming monitored.
As the world becomes increasingly connected with various devices, more options open up for cybercriminals to find out personal information about people and their accounts.
IMAGES FROM THE PUBLIC DOMAIN USED ACCORDING TO TERMS OF USE.