SMG IS 223 Study Guide - Final Guide: Computer Virus, Malware, Ransomware

60 views3 pages
Malicious Software (aka malware)
Malware includes threats like: computer viruses, worms, Trojan horse
Computer virus - rogue (dishonest) software program that attaches to other software programs
or data files usually without user knowing or permission
Viruses spread from computer to computer through downloads or copying infected files
Worms - independent computer programs that copy itself from computer to computer over a
network
Does not need need humans to spread it
Spreads faster than computer viruses
Destroys data and programs; Disrupts or stops computer operations
Computer virus and Worms
Spread over Internet
Spread through
File downloads
Attachments in emails
Online ads
Instant messaging
Drive-by-downloads → very popular method today. Get malware through a
downloaded file
Virus
Spread through physical parts like infected disks and machines
Mobile device malware
Social network malware
On Facebook, friends send a message and you click on it. It’ll ask you to update your
Adobe Flash, but instead it downloads something harmful
Trojan horse - software program at seems friendly but actually does something else
Not a virus; does not replicate
Is a way for viruses or other malware to get into your computer
Like the Trojan horse in the Trojan War. Looks not harmful but when the horse gets into
the city walls,, Greek soldiers reveal themselves and attacks
Example of Trojan horse → Zeus Trojan
Zeus is used to steal bank logins
Spread through drive-by-downloads and phishing (sending emails from good
reputation places in order to get users to give up their passwords, credit card #s)
SQL injection attacks - takes advantage of poorly coded web application software to put in
malicious program code
Largest malware threat
Ransomware - affects phone and computer
Tries to take control of computer or show annoying pop-up messages to get money
Ex: forcing users to pay hundred of dollars to regain access of computer
Get ransomware by downloading infected attachments, clicking on links from emails,
visiting the wrong page
Spyware - attaches to computers to look at web-surfing and give advertising
Example of spyware → keyloggers - record every keystroke
Zeus Trojan uses keylogging
Spyware can slow down computer by taking up a lot of memory
Spyware can reset web browser home pages
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows page 1 of the document.
Unlock all 3 pages and 3 million more documents.

Already have an account? Log in

Document Summary

Malware includes threats like: computer viruses, worms, trojan horse. Computer virus - rogue (dishonest) software program that attaches to other software programs or data files usually without user knowing or permission. Viruses spread from computer to computer through downloads or copying infected files. Worms - independent computer programs that copy itself from computer to computer over a network. Does not need need humans to spread it. Destroys data and programs; disrupts or stops computer operations. Spread through physical parts like infected disks and machines. On facebook, friends send a message and you click on it. Adobe flash, but instead it downloads something harmful. Trojan horse - software program at seems friendly but actually does something else. Like the trojan horse in the trojan war. Looks not harmful but when the horse gets into. Is a way for viruses or other malware to get into your computer the city walls,, greek soldiers reveal themselves and attacks.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents