CompTIA® Security+ : Threats And Vulnerabilities Concepts
3. Threats and Vulnerabilities
3.1 Analyze and differentiate among types of malware
-
Adware: Type of spyware that pops up advertisements based on what it has learned about the user.
-
Virus: A computer virus attaches itself to a program or file so it can spread from one computer to another. Almost all viruses are attached to an executable file, and it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.
-
Worm: Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. The danger with a worm is its capability to replicate itself. Unlike Virus, which sends out a single infection at a time, a Worm could send out hundreds or thousands of copies of itself, creating a huge devastating effect.
-
Trojan Horse: The Trojan Horse, at first glance appears to be a useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening it because it appears to be receiving legitimate software or file from a legitimate source.
-
Spyware A type of malicious software either downloaded unwittingly from a website or installed along with some other third-party software.
-
A back door is a program that allows access to the system without usual security checks. These are caused primarily due to poor programming practices.The following are know back door programs:
-
1. Back Orifice: A remote administration program used to remotely control a computer system.
-
2. NetBus: This is also a remote administration program that controls a victim computer system over the Internet. Uses client-server architecture. Server resides on the victim's computer and client resides on the hackers computer. The hacker controls the victim's computer by using the client.
-
3. Sub7: This is similar to Back Orifice, and NetBus. Used to take control of victim's computer over the Internet.
-
-
Botnet : it is an compromised computer from which malware can be distributed throughout the internet .It is controlled by a master computer where attacker resides.