Professional Documents
Culture Documents
BCN 4th and 5th Chapter Notes
BCN 4th and 5th Chapter Notes
Spread of Malware:
Propagation: Viruses, worms, and Trojans can spread across the network by
infecting connected devices. Worms are known for their ability to self-replicate
and rapidly spread to vulnerable systems.
Compromise: Once inside the network, malware can compromise the security of
individual devices, often leading to data breaches, unauthorized access, and data
corruption.
Data Theft and Exfiltration:
Spyware and Keyloggers: These threats can silently monitor network traffic and
user activities, capturing sensitive data such as login credentials, personal
information, and business-critical data.
Phishing Attacks: Phishing can trick users into revealing sensitive information,
which can then be exploited for malicious purposes.
Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks:
Botnets: Cybercriminals can use botnets to launch DoS and DDoS attacks,
overwhelming network resources and rendering critical services unavailable to
legitimate users.
Impact: This can disrupt business operations, lead to financial losses, and
negatively affect an organization's reputation.
Ransomware: