Computer Threats PDF
Document Details
Uploaded by LaudableDiscernment
Sir Jun
Tags
Related
- Chapter 1 - 03 - Define Malware and its Types - 05_ocred.pdf
- Chapter 1 - 03 - Define Malware and its Types - 08_ocred.pdf
- Chapter 1 - 03 - Define Malware and its Types PDF
- Malware: Understanding the Threats PDF
- Cybersecurity Threats, Vulnerabilities, and Attacks PDF
- Introduction to Cyber Security PDF
Summary
This document provides an overview of various computer threats and perpetrators. It discusses different types of computer threats, including viruses, worms, and Trojans, as well as the motivations and tactics of those who commit computer crimes. This document also explores the concepts of hacking, malicious insiders, and cyberterrorism.
Full Transcript
WHAT IS COMPUTER THREAT? A COMPUTER THREAT, in general, is a person or a thing likely to cause damage or danger to private or any data of an user or organization or any system in ways like removing, stealing, manipulating etc. CRIME CRIME is an action or omission that constitute...
WHAT IS COMPUTER THREAT? A COMPUTER THREAT, in general, is a person or a thing likely to cause damage or danger to private or any data of an user or organization or any system in ways like removing, stealing, manipulating etc. CRIME CRIME is an action or omission that constitutes an offense that may be prosecuted by the state and is punishable by law. PERPETRATOR a person that have different objective, motives, and accessing to varying resources that act same as other criminals. Classification of Perpetrators of Computer Crime Type of Objective Resources available to Level of risk Frequency perpetrator perpetrator taking of Attack acceptable to perpetrator Hacker Test limits of system, gain Limited Minimal High publicity Cracker Cause problems, steal data, Limited Moderate Medium corrupt systems Insider Financial gain or disrupt Knowledge of systems Moderate Low company’s information systems and passwords Industrial spy Capture trade secrets or gain Well funded, well Minimal Low competitive advantage trained Cybercriminal Financial gain Well funded, well Moderate Low trained Cyberterrorist Cause destruction to key Not necessarily well Very high Low infrastructure components funded nor well trained HACKER A HACKER is an individual who tests the limitations of systems out of intellectual curiosity. WHITE HAT HACKER these are hackers that use their skills for good. HACKER A CRACKER who break a code and violate the system integrity that has malicious intent. BLACK HAT HACKER these are hackers that use their skills for bad. MALICIOUS INSIDER An INSIDERS are the top security concern for companies. Insiders can be an employees, consultant, or contractor that have knowledge of internal systems and know the weak points are. INDUSTRIAL SPIES An INDUSTRIAL SPIES are person uses illegal means to obtain trade secret from the competitors of firm for which they hired. Trade secret are protected by the Economic Espionage Act of 1996. CYBERCRIMINALS A CYBERCRIMINALS are hackers (cyber gangs) and other malicious users that use the Internet to commit crimes such as identity theft, spamming, phishing and other types of fraud It engage in all forms of computer fraud. CYBERTERRORISTS A CYBERTERRORISTS are people who intimidate or persuade a government to advance their political or social objective by launching attack against computers and networks. VIRUS A VIRUS is a program with the intent to harm or make a computer system useless. It is a malicious program where it replicates itself and aim to only destroy a computer from file to file. WORM A WORM are another destructive program that executes on its own and it is a free standing program. It spread from computer system to computer system rather than virus that do file to file. WORM TROJAN HORSE A TROJAN HORSE are performing that something destructive while the person at the keyboard thinks they are only downloading an animation or some other file. DISTRIBUTED DENIAL-OF-SERVICE (DDOS) A DDOS it is a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites.. LOGIC BOMB A LOGIC BOMB is a computer virus that contains a logic bomb, which is malicious code that triggers an attack when specific conditions are met.. PHISHING A PHISHING refers to an attempt to steal sensitive information, typically in the form of usernames, passwords, credit card numbers, bank account information or other important data in order to utilize or sell the stolen information.. RANSOMWARE A RANSOMWARE is a type of malware that restricts access to your computer. You need to pay specific amount to access your encrypted files. SPAM A SPAM any unsolicited and often irrelevant or inappropriate messages sent over the internet, typically to a large number of users, primarily for advertising, phishing, spreading malware, or other similar purposes ADWARE An ADWARE also know as advertising software is the term used for various pop-up advertisements that show up on your computer or mobile device and that become malicious and harm your device by slowing it down, hijacking your browser and installing viruses and/or spyware. SPYWARE A SPYWARE malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent. It involves spying on users with an aim of collecting information.