Zusammenfassung der Ressource
System Threats
- Malware
- It's used for many different
reasons which include:
- Disrupting computer systems
- Gaining sensitive info
- Gaining access to private systems
- Displaying unwanted adverts
- Methods
- Viruses
- Worms
- Scareware
- Trojan horses
- Spybots
- Prevention
- Installing anti-virus software
- Always updating systems whenever possible
- Think before clicking
- Always backing up files
- Malicious software is used to gain access to and damage computers without consent
- Effects
- Computer crashing or slowing down
- Files may be deleted, stolen, corrupted, encrypted or changed
- They may record your keystrokes to gain passwords, bank info, usernames etc
- Phishing
- How is it done?
- Usually an email or message will be sent to the victim
- It will either ask for money or link you to a fake website that looks real
- The victim then enters their info on this website into the hands of the online criminals
- What is gained?
- Bank details
- Usernames
- Passwords
- Preventions
- Learn the signs that an email or website is fishy
- Promote gifts, similar business logos, real name of employees, spelling mistakes in the email etc.
- Safe websites begin with https:// and have a closed lock icon so only enter info on these sites
- Strong protection
- Disable pop-ups
- What is it?
- Phishing is the attempt to gain sensitive information from peoplethrough email/instant messenger
- Brute force attack
- What is it?
- It's when an attacker tries many passwords in the hope of guessing correctly with one
- How does it work?
- It works by calculating every possible combination that could make up a passwords length
- Prevention
- Longer passwords can take decades to crack whereas short passwords can be discovered quickly
- So create a long password with a mix of characters and numbers
- Don't use dictionary words or slightly modified words as it is easy to guess
- Locking accounts after failed guess attempts but this has its own problems
- Captcha
- What do they gain?
- Theft of data
- Access to private systems
- Denial of service attack
- What is it?
- It's an attack launched on a network or website
- DOS attacks are different, some can be relatively harmeless whilst others are infected with trojans
- How?
- Cyber criminals flood the target with useless requests or log in requests
- This grinds the system to a halt
- Malware can be used to control many computers to launch this attack ('zombies') which all send requests at the same time
- Why and what is gained?
- Extortion - Attackers can demand money to stop the attack (although success rate is low)
- Sometimes people who DOS are hired to launch an attack on a rival company
- To show their disapproval to a game, or the government, for example
- To distract a network/company to perform other attacks
- Results in a the compan/network losing reputation, time and money
- Prevention
- There isn't really a way to prevent an attack but making a plan if it happens,
- constantly patching up vulnerabilities,
- and having a strong firewall are ways to minimise damage
- Packet filters on roters
- SQL Injection
- What is it?
- SQL's a programming language and a hacker uses it to target a database or website form
- How?
- When the form asks for input, an SQL statement is entered which runs and allows the user...
- ...to control or change data in the database
- Prevention
- Lock down database servers and remove backdoors
- Change default admin passwords
- Prevention testing
- Effects
- Revealing data that's hidden
- Data is controlled,stolen or changed
- Data interception
- What is it?
- When a hacker intercepts data packets when they are being sent without the user knowing
- How?
- A hacker uses data packet analysers to intercept data packets when they are sent from a computer
- Why, what do they gain?
- Hackers gain things such as logins,passwords,credit cand numbers and PIN's
- Prevention
- Using data encrypting techniques so the hacker will get useless info