Threats to Computer Systems
Malware – designed to disrupt, damage or gain unauthorised access to a computer
Virus – A type of malicious software able to spread between computers and causes damage to data and software.
Worm – Its primary function is to spread replicas of itself from one device to another and it remains active on infected
computers.
Trojan – It disguises itself as a legitimate application or masks its true intent which is to spread malware.
Adware - Pop-up advertisements that show up on your computer or mobile device. It has the potential to become malicious
and harm your device by slowing it down, hijacking your browser and installing viruses and/or spyware.
Spyware - Malicious software that enters a user's computer, gathers data from the device and user, and sends it to third
parties without their consent.
Ransomware - Prevents you accessing your device and the data stored on it, usually by encrypting your files. A criminal
group will then demand a ransom in exchange for decryption.
Scareware - Claims to have detected a virus or other issue on a device and directs the user to download or buy malicious
software to ‘resolve’ the issue.
Rootkits – It allows an external party to maintain command over a device without the user being aware of it. The controller
has the ability to remotely execute files and change system configurations on the host machine.
Pharming – It redirects a user from a genuine website to a fake one.
Social engineering – manipulating, influencing or deceiving victims to gain control over computer systems
Phishing – A scam that prompts the user to click on a link and disclose personal information like passwords and usernames
for a particular site.
Spear phishing - Spear phishing is a more targeted cyber-attack than phishing. Emails are personalized to the intended
victim. For example, the attacker may identify with a cause, impersonate someone the recipient knows, or use other social
engineering techniques to gain the victim's trust.
Tailgating - a cyber-attack used to gain unauthorized access to online accounts or systems protected by a password.
Other threats
Brute force attacks – a computer algorithm will use trial and error to crack passwords or encryption keys.
Denial of service attacks – Multiple computers will repeatedly send requests to a particular server to overload it and
prevent other users accessing it.
Data interception and theft – Where sensitive data is intercepted during transmission. Usually, a packet sniffer is utilised
and the data collected is sent back to the hacker
SQL injection – Vulnerability in the security of a website allowing attackers to gain access to the database by placing some
simple SQL code at the end of the username or password query.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller adigoniefire. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.62. You're not tied to anything after your purchase.