Malware

?
  • Created by: Rjarman
  • Created on: 15-06-18 11:12

Botnet

A collection of software robots, or 'bots' that creates an army of infected computers (known as ‘zombies') that are remotely controlled by the originator. Yours may be one of them and you may not even know it. They can send spam emails with viruses connected, Spread all types of malware and can use your computer as part of a denial of service attack against other systems.

1 of 4

Adware

Adware is unwanted software designed to throw advertisements up on your screen, most often within a web browser. Some security professionals view it as the forerunner of the modern-day PUP (potentially unwanted program). Typically, it uses an underhanded method to either disguise itself as legitimate, or piggyback on another program to trick you into installing it on your PC, tablet, or mobile device.

2 of 4

Bot

Amalicious use of bots is the coordination and operation of an automated attack on networked computers, such as a denial-of-service attack by a botnet. Internet bots can also be used to commit click fraud and more recently have seen usage around MMORPG games as computer game bots. A spambot is an internet bot that attempts to spam large amounts of content on the Internet, usually adding advertising links. More than 94.2% of websites have experienced a bot attack. There are malicious bots (and botnets) of the following types: Spambots that harvest email addresses from contact or guestbook pages Downloader programs that **** bandwidth by downloading entire websites Website scrapers that grab the content of websites and re-use it without permission on automatically generated doorway pages Viruses and worms DDoS attacks Botnets, zombie computers, etc.

3 of 4

Bug

A security bug or security defect is a software bug that can be exploited to gain unauthorized access or privileges on a computer system. Security bugs introduce security vulnerabilities by compromising one or more of: Authentication of users and other entities Authorization of access rights and privileges Data confidentiality Data integrity

4 of 4

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Network threats resources »