Chapter 4 - Cyber-Attacks & Malwares

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Chapter 4: Cyber-Attacks & Malwares CRACKERS

- As opposed to hackers, who do break-ins for


Computer Security Risk more or less positive reasons.
- It is any event or action that could cause a
loss or damage to computer hardware, - Crackers are malicious hackers, people who
software, data, information, or processing break into computers for malicious purposes
capability. - to obtain information for financial gain,
- While some breaches to computer security shut down hardware, pirate software, steal
are accidental, many are intentional. people’s credit information, or alter or
destroy data.
An intentional breach of computer security often
involves a deliberate act that is against the law. FOUR CLASSES OF CRACKERS:

Any illegal act involving a computer generally is A. SCRIPT KIDDIES


referred to as a computer crime. The term - Mostly teenagers without much technical
cybercrime refers to online or Internet-based illegal expertise who use downloadable software or
acts. Today, cybercrime is one of the FBI’s top three source code to perform malicious break-ins.
priorities. - Also called as “script bunnies” use
published source code to construct viruses.
CYBER INTRUDERS
B. HACKTIVISTS
HACKERS - They are are “hacker activists. ” People
- As computer enthusiasts, people who enjoy who break into a computer system for a
learning programming languages and politically or socially motivated purpose.
computer systems.
- As people who gain unauthorized access to C. BLACK-HAT HACKERS
computers or networks, often just for the - Those who break into computer systems to
challenge of it. steal or destroy information or to use it for
illegal profit.
Two types of hackers who break into computers for - The people behind the increase in
relatively benign reason: cyberattacks on corporate networks.

A. Thrill-seeker hackers: Hackers who illegally D. CYBERTERRORISTS


access computer systems simply for the challenge - Cyberterrorism, according to the FBI, is
of it. Although they penetrate computers and any “premeditated, politically motivated
networks illegally, they don’t do any damage or attack against information, computer
steal anything; their reward is the achievement of systems, computer programs, and data
breaking in. which results in violence against
noncombatant targets by sub-national
B. White-hat hackers: They are usually computer groups or clandestine agents. ”
professionals who break into computer systems and
networks with the knowledge of their owners to TROLLS
expose security flaws that can then be fixed. According to the Digital Freedom Network, an
internet troll is one who posts controversial
Kevin Mitnick (“The World’s Most Famous opinions with the intention to incite anger from
Hacker”), for instance, became a tech security others in order to distract people from the real
consultant after serving five years in prison for controversies.
breaking into corporate computer systems in the
mid-1990s.
- Support a certain candidate and undermine launch an attack that will compromise the
opposing candidates. organization’s network - if they are not paid
a sum of money.
- They may also tag certain groups to support
opposing political groups. Usually, they MALWARE (Malicious Software)
would set up a fake social media account in - A program that acts without a user’s
order to retain their anonymity and escape knowledge and deliberately alters the
prosecution. computer’s operations.

THIEVES - A generic term for any software that affects,


- Thieves work is simply by gathering as or attempts to effect, some malicious
much personal data about a person as they purpose.
can. To some extent, it is impossible to
avoid personal data about you being made CELLPHONE MALWARE
public. For example, court records are - A cellphone virus is basically the same thing
public records and many courts now have as a computer virus: an unwanted executable
records available online. file that “infects” a device and then copies
itself to other devices.
- They tend to be target-rich environments for
personal information. There are a few things - But whereas a computer virus or worm
you can do to decrease the chances of an spreads through email attachments and
identity thief getting personal information internet downloads, a cellphone virus or
about you via a social-networking site: Keep worm spreads via internet downloads, MMS
most of your information private and share attachments, and Bluetooth transfers.
it only with friends.
- The most common type of cellphone
CORPORATE SPIES infection right now occurs when a cellphone
- have excellent computer and networking downloads an infected file from a PC or the
skills and are hired to break into a specific internet, but phone- to- phone viruses are on
computer and steal its proprietary data and the rise.
information. Unscrupulous companies hire
corporate spies, a practice known as HOW MALWARE IS SPREAD?
corporate espionage, to gain a competitive
advantage. Worms, viruses, and Trojan horses are passed in the
following ways:
UNETHICAL EMPLOYEES
- break into their employers’ computers for a ● By infected floppies or CDs: The first way
variety of reasons. Some simply want to is via an infected floppy disk or CD, perhaps
exploit a security weakness. Others seek from a friend or a repair person.
financial gains from selling confidential
information. Disgruntled employees may ● By opening unknown email attachments:
want revenge. The second way is from an email
attachment.
CYBEREXTORTIONIST
- Some who uses E-mail as a vehicle for ● By clicking on infiltrated websites: Some
extortion. These perpetrators send an crackers “seed” web pages with contagious
organization a threatening E-mail message malware that enables them to steal personal
indicating they will expose confidential data, so that by simply clicking on a website
information, exploit a security flaw, or you can unwittingly compromise your PC.
● Through infiltrated Wi-Fi hot spots: As Backdoor Program
mentioned earlier, if you’re a user of Wi-Fi - is an illegal program that allows illegitimate
wireless access points, or hot spots, you users to take control of your computer
have to be aware that your laptop or PDA without your knowledge.
could be exposed to wireless transmitted
diseases from illegal users. 5. LOGIC BOMB
- A logic bomb is a program that lies dormant
KINDS OF MALWARE until a specific logical criterion is met. That
criterion could be a certain date, a certain
1. DENIAL-of-SERVICE ATTACKS user logging onto the system, or a certain
- A denial-of-service (DoS) attack, or threshold being reached (a certain number of
distributed denial-of-service (DDoS) attack, files or number of users being reached). A
consists of making repeated requests of a logic bomb could also be programmed to
computer system or network, thereby wait for a certain message from the
overloading it and denying legitimate users perpetrator.
access to it.
6. ROOTKIT
2. WORMS - A rootkit will usually attempt to gain root or
- A worm is a program that copies itself administrator access. But the name has
repeatedly into a computer’s memory or come to mean any program that works to
onto a disk drive. hide the fact that the infected machine has
been infected. That means any virus, worm,
- A worm known as Conficker or logic bomb, or Trojan horse that hides its
Downadup, spread through a Microsoft presence and covers its tracks could be
Windows vulnerability that allowed considered a rootkit.
guessing of network passwords and by
people hand-carrying such gadgets as USB 7. SPYWARE
keys, infected millions of computers. - Spyware is software that monitors a
user'scomputer activity surreptitiously,
3. VIRUS collecting various types of information,
- A virus is a “deviant program, stored on a including keystrokes, passwords, browsing
computer floppy disk, hard drive, or cd, that history, and more. This software can be used
can cause unexpected and often undesirable for legitimate purposes, such as parental
effects, such as destroying or corrupting monitoring or employee oversight, but it is
data. also commonly associated with malicious
activities, posing a significant threat to user
- The most well-known malware is the virus. privacy and security. Spyware may be
Technically speaking, a virus is any installed on a computer without the user's
software that self-replicates. knowledge and can transmit gathered data to
external parties, making it a potent tool for
4. TROJAN HORSES unauthorized data collection and potential
- A Trojan horse is a program that pretends to harm.
be a useful program, usually free, such as a
game or screen saver, but carries viruses, or FORMS OF SPYWARE:
destructive instructions, that perpetrate
mischief without your knowledge. One a. ADWARE OR POP-UP GENERATORS
particularly malicious feature is that a - A kind of spyware that tracks web surfing or
Trojan horse may allow so-called backdoor online buying so that marketers can send
programs to be installed. you targeted and unsolicited pop-up and
other ads. This is the most common, and
benign, type of spyware. - Before using any removable media, scan the
media for malware. Follow this procedure
b. BROWSER HIJACKERS & SEARCH even for shrink-wrapped software from
HIJACKERS major developers. Some commercial
- More damaging kinds of spyware are software has been infected and distributed to
browser hijackers, which change settings in unsuspecting users.
your browser without your knowledge, often
changing your browser’s home page and - Install a personal firewall program.
replacing it with another web page, and
search hijackers, which intercept your - Stay informed about new virus alerts and
legitimate search requests made to real virus hoaxes.
search engines and return results from
phony search services designed to send you
to sites they run.

c. KEY LOGGERS
- They can record each character you type and
transmit that information to someone else on
the internet, making it possible for strangers
to learn your passwords and other
information.

Tips for Preventing Viruses and Other


Malware

- Never start a computer with removable


media inserted in the drives or plugged in
the ports, unless the media are uninfected.

- Never open an e-mail attachment unless you


are expecting it and it is from a trusted
source.

- Set the macro security in programs so that


you can enable or disable macros. Enable
macros only if the document is from a
trusted source and you are expecting it.

- Install an antivirus program on all of your


computers. Update the software and the
virus signature files regularly.

- Scan all downloaded programs for viruses


and other malware.

- If the antivirus program flags an e-mail


attachment as infected, delete or quarantine
the attachment immediately.

You might also like