2(A) Discuss different types of treats and malicious
program(malware) that can damage a computer, mobile device or disrupt any
system.
Malicious software ( malware ) include virus, worms, Trojan
horses, adware, rootkits, keyloggers, dialers, ransomware, spyware and many
more. These various kind of malwares are dangerous not only to computers but
basically any devices that has operating systems in it including mobile phones.
Viruses are the most famous type of malware. People often
refer any type of harms infecting their computers as virus. Viruses replicate
themselves spontaneously and infect the whole system without authorization.
Their source of spreading is mainly the mail when one open the mail without
realizing what they actually open up themselves to. However, it can also travel
through flash drive and any other file-transferring medium such as CD-drive.
Once installed, it will infect other files present in your computer and attempt
to propagate to other systems. The harmful effects cover from slowing system
performance to worst of all, clearing out the entire computer till every single
files.
Worms are completely different than viruses. Although they
both have the ability to replicate themselves and propagate other files, worms
tend to leach onto network traffic, unlike virus which moves from one machine
to another machine. Worms do not need a hard drive to travel through one system
to another. It can just easily travel through internet and inflict great damage
from deleting files to even creating backdoors that give its creator control of
a system from distance.
Spyware is rather safe compared to others. However safe it
might sound, spyware is still considered a malware as it invades our privacy by
tracking and reporting computer activity without consent. It doesn’t afflict
any damage to a system however it tends to slow one’s performance. They usually
attached themselves along free software that people tend to download in open
source network. It automatically installed alongside the software you download.
Spyware is widely connected to adware following its common effects towards the
system. Spyware is able to pop up advertisements the same way adware is able
to.
Rootkits are aimed to overtake the whole control of a
system. This is among the hackers’ favorites as it allows the hackers to take
control over someone’s computer from a million miles away. Compatible with its
outstanding ability, it’s also very sophisticated to decipher by hackers. Once
mastered by hackers, this malware will infect other computers as well and
enslave them as zombies, forcing them to do whatever the hacker wants while the
real culprit goes undetected.
2(B) Search for information on current known malware
program. Base on the information that you have found, create a table to list
different types of malware, what it does, how it can be repaired and removed.
These information is useful for you to prevent any malware from damaging
|
MALWARE NAME
|
TYPE
|
SPECIFICATION/HARM IT DOES..
|
HOW TO REMOVE IT
|
|
Flame/Skywiper
|
Trojan
|
§ Attack computer running Microsoft office
§ Turn infected computer into Bluetooth beacon which transfer
contact information from any Bluetooth device nearby
|
·
By using BITDEFENDER
removal tool that only remove FLAME TROJAN
|
|
Shamoon
|
worm
|
§ Attack computer running Microsoft window
|
§ Installed SpyHunter’s malware to detect and remove the worm
|
|
NGRbot
|
worm
|
§ Steals victim’s information
§ Causing redirection
§ Blocking victims from getting updates of security and
ant-malware product
|
§
We can follow the
guideline from NGRBot manual removal
|
|
Duqu
|
worm
|
§ Gather information and supply it to the server
§ Attack Microsoft windows system
§ Delete all recent information entered
§ Steals digital certificate
|
§ Running a stand-alone virus removal tool from CD or USB flash
drive
|
Reference:en.wikipedia.org/wiki/Wikipedia/computer malware
By: Naufal Khan and Marcyril Marcos
No comments:
Post a Comment