Академический Документы
Профессиональный Документы
Культура Документы
security threats
explained
What is Malware?
Malware can be compared to the pea in a shell game. A street con running a
shell game on the sidewalk lures the mark (or victim) into trying to follow the
pea, when actually it’s an exercise in sleight of hand. Similarly, malware also
relies on sleight of hand—how to infect, persist, and communicate without
being detected. To understand, control, and successfully counter malware, we
need to focus on not just the pea (malware), but on all the moving parts.
Types of Malware
Malware has come a long way in the past thirty years. Initially malware was
thought of as an interesting experiment—what if computer programs could
take control of a system?
It has progressed from being a tool for jokes between programmers, to
become one of the key techniques used by cyber criminals to wreak havoc in
the cyber world. The most commonly used malware techniques are as follows:
Virus- Computer viruses are just like biological viruses. They spread
rapidly, their spreading is accelerated or mitigated by human actions,
and more often than not, they are harmful to their host’s health.
Computer viruses spread to other computers by attaching themselves
to various programs, which are then replicated when the program is
run. They are often spread by sharing files or software between
computers. Just like shaking hands with a person who has a viral
infection can infect you, sharing files, like a picture or a song, with a
virus infected computer can infect your computer as well. Viruses can
be used to harm host computers and networks, steal confidential
information, and create botnets (collection of compromised
computers). Some viruses have the ability to hide inside encrypted
files, making it difficult to detect the virus. Encrypted files are those
files which only can be accessed with the correct password.
There was one instance, where a Trojan introduced viruses into computers by
claiming it could get rid of viruses present in the computer.
Worm- A Worm is the most commonly used type of malware. It’s a program
which enters an operating system with the intention of spreading malicious
code. It also harms
the computer by consuming excessive bandwidth, deleting files, or by sending
documents through email. Some of the commonly used worms by hackers are
Storm Worm, Nimda, and Morris Worm.
Worms are often confused with viruses—worms have the ability to self-
replicate while viruses rely on human activity to spread.
Adware: program code embedded to the software without user being aware
of it to show advertising. As a rule adware is embedded in the software that is
distributed free. Advertisement is in the working interface. Adware often
gathers and transfer to its distributor personal information of the user.
Backdoor- The term backdoor attack (known also as backdoor) can have two
different meanings. The original term backdoor referred to troubleshooting
and developer hooks into systems that often circumvented normal
authentication. During the development of a complicated operating system or
application, programmers add backdoors or maintenance hooks. Backdoors
allow them to examine operations inside the code while the code is running.
The backdoors are stripped out of the code when it’s moved into production.
When a software manufacturer discovers a hook that hasn’t been removed, it
releases a maintenance upgrade or patch to close the backdoor. These patches
are common when a new product is initially released.
The second type of backdoor refers to gaining access to a network and
inserting a program or utility that creates an entrance for an attacker. The
program may allow a certain user ID to log on without a password or to gain
administrative privileges.
Surviving Viruses
A virus is a piece of software designed to infect a computer system. Under the
best of circumstances, a virus may do nothing more than reside on the
computer, but it may also damage the data on your hard disk drive (HDD),
destroy your operating system, and possibly spread to other systems.