Abbeyfield malware

?
  • Created by: UHE1
  • Created on: 12-06-19 13:01
J B X A H N H E G S K K J H Y B T E V O D
P V Q B R U T E F O R C E Y J Q R E C O Y
E G H P M A S C P F C H G F R L N E R Y G
N H K C H G F N A X L N O C Q P E B J C A
E Q B S V Y P J B B I G N J I E T H A I B
T S R I Y E P C M H M X V K C C W N V E E
R T L X J S W S S O P E R U W C O L Y H S
A E G A Y G E I U O L R L B I Q R T P U T
T S L L X R H G R R H A V U S U K K S Y A
I J B X U P V P I Q L W I C V K F B Y T C
O V J N M R U B V H R L C B S O O X C V J
N J Q U Y G F K G U V A S H N O R O N J Y
T E D G A N E T J C P M M L E X E I L S O
E P K J S U R D G Y U C O A M F N Q R G U
S U V H M O T O M N Y G F B C U S G G S I
T X X Q J T F R Y G D U D A L A I V I J B
I W H A F V M C I O T H L I K O C S K L N
N N N J P K H Y P S U L M A T I S S X D K
G W Q D W J Q G N P M P D X Q J E E W S B
A F F S D X U D U E K L H E S C S D L V V
F W U Q U I D F F B P I B C F H J G P A N

Clues

  • A piece of malware that attaches itself to a program or file. Cannot affect a computer unless the infected file is executed. Damage caused could be anything from annoying to deleting system files. (5)
  • A piece of malware that pretends to be a legitimate bit of software but once installed does something different. What they do could vary from making annoying changes, deleting files to opening a backdoor to allow malicious users access. (6)
  • A program that is designed to cause some form of harm to a computer or network. (7)
  • Attempting to gain unauthorised access by testing combinations of different passwords. Could use a dictionary of commonly used passwords or try every possible key combination. (5, 5)
  • Captures, stores and analyses data about the network. The information can identify normal patterns and trends. When something occurs that does not fit the normal, it can hopefully be identified and stopped before it causes damage. (7, 9)
  • Emails that pretend as if they are from a legitimate source but are actually from fraudsters. The aim is to steal money, log in details or identities. (8)
  • Used to identify weaknesses in a system. Tasks can include identifying possible target areas, looking for possible entry points, attempting to break in and seeing how much damage different user levels could cause. (11, 7)
  • What is it called when there are vulnerabilities due to poor planning, poorly written code, lack of staff training or lack of staff guidelines or insufficient security measures? (3)

Comments

UHE1

Report

THis is my work

Similar Computing resources:

See all Computing resources »See all Hardware resources »