Zusammenfassung der Ressource
Why are systems
attacked
- fun/challenge
- hacking systems can
be fun or a challenge
- their is a sense of
achievement
- friends may give respect
for the hacking achievment
- distruption
- attacks such as
Denial-Of-Service stop
websites working
- viruses can slow down
computers and delte
files
- financial gains
- ransoms can be made
to prevent attacks
from happening
- ransomware can be
used to encrypt a
computer until you pay
- a payment is given to
carry out an attack on a
organisatioon
- Industrial espionage
- the aim is to find intellectual
property such as designs or
blueprints for products , business
stratagies or software source
code
- personal attack
- employees that are
unhappy might try and
attack the company
- friends/family may attack each
other if upset over something
- information/data theft
- credit card and financial
details are stolen to gain
money
- company information may
also be stolen
- Malware
- Malicious Software
- This is an umbrella term given to software
that is designed to harm a digital system,
damage data or harvest sensitive
information.
- Virus
- A piece of malicious code that
attaches to a legitimate program.
It is capable of reproducing itself
and usually capable of causing
great harm to files or other
programs on the same computer
- Worm
- Similar to virus but unlike a virus it is a self
contained program. It is capable of spreading
on it own, without help from humans. Worms
get around by exploiting vulnerabilities in
operating systems and attaching themselves
to emails. They self replicate at a tremendous
rate, using up hard drive space and
bandwidth, overloading servers.
- Trojan Horse
- is a type of malware that
is often disguised as
legitimate software.