logo

Types of Malicious Software - PDF

   

Added on  2021-06-14

25 Pages4952 Words204 Views
Table of Contents1. Introduction...........................................................................................................................................11.1 Malware................................................................................................................................................11.2 Types of malicious software................................................................................................................12. PART A-Questions and Answers.........................................................................................................33. PART B- Questions and Answers.........................................................................................................94. TOOLS.................................................................................................................................................13References................................................................................................................................................21

1. Introduction1.1 MalwareMalware is known as malicious software. It is a software affect to the computer system.Malware it is a kind of viruses, Trojans, spyware. It works to be steal the protected data ordocuments created by the user. And it acts as a spy to cause affect. Spyware is one kind ofmalware and it monitor the user location and get through secret data. Adware is another kind ofsoftware it affects in the way of share the information with advertisers and unwanted ads. Wormsand viruses is the special kind of virus to affect entire system. We can use anti-malware softwareto provide a prevention to this malware. Firewall is like protection to this malware. And thismalicious software’s works in the function like delete the secret data as well as stealing the data.1.2 Types of malicious softwareSpywareVirusesWormTrapdoorLogic bombTrojanRATMobile malicious code Malicious fontRootkitSpywareSpyware is one kind of program or software the main aim of this spyware is getting theinformation about the person without the vision of user. And whatever information handled byspyware it upload that in the internet as ad. It can enter into the computer in the way ofinstallingnew software by using pen drives or any other way.1

VirusesVirus is a kind of code or some software it can enter the system in the way of copyinganother program or it can enter while booting. It can be spread by either email or some newdownloaded file or by the cd or pen drive it can enter in the system.Worm Worm also affect the computer system in the way of put duplicate files or create theduplicate file in that the original document. While the system works are stopped or slowing, itcould be entered.Logic bombLogic bomb is another kind of programming code and it vision is like an executable file.If some program execution is delayed for some action in the gap this logic bomb entered. Itmake delete or corrupt the data. TrapdoorTrapdoor is used to getting the access of another system without that system permissionlike without knowing the password. Hackers generally using this trapdoor to get the persondetails.TrojanTrojan is the way of programmable code or software code it can make an affect ordamage in the hard disk. Trojan is part of malicious virus.RATRAT is known as remote admin Trojans it has a remote control to access a machine. Andthis is used to get the password and steal the information. And it is invisible to the user and it canentered via cd or pen drive.2

Malware Malware is known as malicious software it affect the computer system and it is in theforms of worms and viruses.Mobile malicious codeIts acts like a remote access to get the information and it is look like a web documents itexecutes in the web browser.Malicious fontWebpage that explore the method to describe the font and it acts as a malicious font forthe security.RootkitsIt acts as a software tool is used as the intruders to get the access of computer knowledgewithout the permission of computer. It is called as a rootkit computer and it get through byvariety of operating systems like windows and Linux. In the rootkit it has three types of rootkitsthey are kernel rootkit, application rootkit and library rootkit.2. PART A-Questions and Answers Social engineering is used for with range of malicious activities it done by humaninteraction. It do like user make mistakes and from that getting the information. It first find thevictim of the information used by the security protocols.3

Attacking methodsThis kind of attacking is performed in the human interaction. These has some methods,BaitingScare warePretexting PhishingSpear phishing BaitingIt performs in the physical media in the kind of malware. Using this bait the malware getsautomatically into the system. It is speared like online forms.Scare wareScare ware is the fraud software and it act as a good software and vision to the user. It isknown as deception software.PretextingPretexting works as to get a confirmation about the user data and their data.PhishingPhishing is used by the way of email and text message and make a urgent and curiosity.Spear phishingSpear phasing is one kind of phasing it requires more effort by done may take twomonths.4

Preventing methodsSocial engineering concepts are preventing methods to the malicious software. It hasthree techniques to the prevention. First one is did not open the mail and any other files from theinternet and use multi factor authentication and update the anti-virus software often.After opened that file we known about the attached file with email has malicious orinfected and the infected file with the original document and affected the entire system. By usinganti-virus or prevention method or scanning process we get pure document what is really in themail document.1.Backup and restore the important files what you have in your system.2.By disconnecting the internet we can stop the download items in your system.3.And consider the safety measures when booting the system such as anti-virus andscanning to get the resources.4. And for the internet get the access from another system through LAN connection forsecurity and solve malware problems.5.Analyze the software and find the corresponding solution.6.Scan the file multiple files what are downloaded from the internet.7.Maintain the disk as clean and format often.5

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Malware Analysis Assignment PDF
|29
|6377
|378

Malware Analysis: Types, Prevention, and Task Analysis
|52
|8215
|322

Malware Virus: Types, Analysis, and Prevention
|14
|3926
|1

Understanding SQL Injection, Insider Attacks, and Malware Threats for Enhanced Cybersecurity
|7
|2711
|157

Understanding Malware: Types, Detection, and Analysis
|12
|899
|33

Code of Conduct Question Answer 2022
|7
|1173
|25