🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 1 - 03 - Define Malware and its Types - 15_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Information Security Threats and Vulnerabilities Exam 212-82 Malicious programs that independently replicate, execute, and spread across the network connections Eaee® smmam ) 9090 v" Consume available computing resources without human interaction v’ Attackers use w...

Certified Cybersecurity Technician Information Security Threats and Vulnerabilities Exam 212-82 Malicious programs that independently replicate, execute, and spread across the network connections Eaee® smmam ) 9090 v" Consume available computing resources without human interaction v’ Attackers use worm payloads to install backdoors in infected computers... Network Attacker propagates Worm =~ B = (A A @., Downloads Malicious program NS.\@ ) T... A ‘ - All Rights Reserved. Reproduction is Strictly Prohibited Computer Worms Computer worms are standalone malicious programs that replicate, execute, and spread across network connections independently without human intervention. Intruders design most worms to replicate and spread across a network, thus consuming available computing resources and, in turn, causing network servers, web servers, and individual computer systems to become overloaded and stop responding. However, some worms also carry a payload to damage the host system. Worms are a subtype of viruses. A worm does not require a host to replicate; however, in some cases, the worm’s host machine is also infected. Initially, black hat professionals treated worms as a mainframe problem. Later, with the introduction of the Internet, they mainly focused on and targeted Windows OS using the same worms by sharing them in via e-mail, IRC, and other network functions. Attackers use worm payloads to install backdoors on infected computers, which turns them into zombies and creates a botnet. Attackers use these botnets to initiate cyber-attacks. Some of the latest computer worms are as follows: = Monero = Bondat. Beapy Module 01 Page 68 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Information Security Threats and Vulnerabilities Network Attacker propagates Worm Exam 212-82 Downloads Malicious program Infects other victim systems Figure 1.10: Depiction of worm Module 01 Page 69 propagation Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser