Malware or Malicious Software - PowerPoint PPT Presentation

1 / 4
About This Presentation
Title:

Malware or Malicious Software

Description:

Malware or 'Malicious Software' Trojan Horses ... Passwords- are the most common tool used to restrict access to computer system. ... – PowerPoint PPT presentation

Number of Views:68
Avg rating:3.0/5.0
Slides: 5
Provided by: jlg7
Category:

less

Transcript and Presenter's Notes

Title: Malware or Malicious Software


1
Malware or Malicious Software
  • Trojan Horses
  • Performs useful tasks and hides in an attack
    package erasing files, changing data, and passing
    data to other unauthorized users. Ex Logic Bomb
  • Worm
  • They produced themselves to consume the bandwidth
    of network.
  • Viruses- software program capable of reproducing
    itself and usually capable of causing great harm
    to files or other programs.

2
Consequences
  • Computer crime
  • Identity theft- get sensitive information by
    using a malicious software.
  • Spoofing- to steal password. Usually to collect
    personal information. Ex card numbers or
    drivers license number.

3
Consequences
  • Computer hacking
  • Cracking- criminal hacking. Electronic
    trespassers enter corporate and government
    computers using stolen passwords and security
    holes in operating system software.
  • Zombie- a computer that is taken over by a
    Malicious hacker without the knowledge of the
    computer owner. Usually to hide their undercover
    attack.
  • Denial of Service Attack (DoS)- a type of attack
    on a network that is designed to bring a network
    to its knees by flooding in with useless traffic.
    Usually done by Zombies.

4
Defenses
  • Firewalls- to keep their internal networks secure
    while enabling communication with the rest of the
    internet.
  • Encryption- software to scramble their
    transmissions. Used to protect transmitted
    information from hackers.
  • Cryptography
  • Audit-control software- used to monitor and
    record computer transactions as they happen so
    auditors can trace and identify suspicious
    computer activity after the fact.
  • Passwords- are the most common tool used to
    restrict access to computer system.
Write a Comment
User Comments (0)
About PowerShow.com