100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
IT presentation £5.49
Add to cart

Presentation

IT presentation

 9 views  0 purchase

An information technology presentation can be useful for learning about new technologies and trends. IT presentations can be informative and educational, providing insight into cutting-edge tech and practices. I think IT presentations can also help people understand complex topics in a simple way. ...

[Show more]

Preview 2 out of 8  pages

  • August 8, 2023
  • 8
  • 2022/2023
  • Presentation
  • Unknown
book image

Book Title:

Author(s):

  • Edition:
  • ISBN:
  • Edition:
All documents for this subject (5)
avatar-seller
abdulmajidmohamed1
4.1 Types of threats
Types of malware Why it is used How it works How to mitigate
Adware Adware generates Adware is also known as advertising-supported software. This is any -Install, run and keep
revenue for its author software package that automatically shows pop-ups. It may also be the updated a security software
Trojan It is a They often appear to b
Horse standalone that is wanted or need
user interface of a software package or on an installation screen. package
Adware itself is harmless however some adware may include spyware -Do not open any files from malicious of a PC. They can be h
such as keyloggers an unknown source program programs and software
-Do not click any links in designed to can make copies of the
emails give full information or harm th
control of an computer systems
Bot Bot takes control of a It is a type of malware that allows a cyber-security attacker to take (Look at Adware) infected PC
computer system control of an infected computer system without the user’s knowledge. to another
It can result in a botnet which is an interconnected network of PC
infected computer systems

Bug Bugs are connected to Bugs are usually the result of human error during the coding of the Check for and install any patches
Virus A virus A virus is a computer p
software and are a flaw software. Most bugs can be fixed by the software creator issuing a fix that are released from software
vendors attempts to replicates itself and sp
that produces an or patch. Security bugs are the most severe type and can allow cyber make a computer to computer
unwanted outcome attackers to bypass user authentication, override access privileges or computer increase their chances
steal data. system other computers by in
unreliable network file system or
Ransomware Ransomware holds a Ransomware can restrict user access to the computer system by (See Adware) that is accessed by oth
computer system encrypting files or locking down the computer system. A message is
captive and demands a usually displayed to force the user to pay so that the restrictions can Worm It is a A worm can use a com
ransom, usually money be lifted and the user has access to the data or computer system. It is standalone to spread. Unlike a com
to release it spread like a worm and can be started by downloading an infected file computer does not need to attac
or by a vulnerability on the computer system. program existing program. Wor
that always cause some har
replicates even if only by consum
itself so it
can spread
to other
Rootkit A rootkit is designed to When a rootkit has been installed it can enable a cyber attacker to -Rootkits are difficult to detect
computers
remotely access a remotely access files, access/steal data and information, modify as they are not usually detected
computer system or software configurations or control the computer system as part of a by security software
control a computer botnet -Software updates, keeping
system without being security software up to date and
not downloading suspicious files
detected by security are the only ways to avoid a
software or the user rootkit from being installed

Spyware It can collect data from It is usually hidden from a user and can be difficult to detect. It is often (Look at adware)
an infected computer, secretly installed on a user’s personal computer without their
including personal knowledge. Some spyware such as keyloggers however may be
information like installed intentionally to monitor users. Spyware can also install
websites visited, user additional software or redirect web browsers to different websites. A botnet is an interconnected network
logins and financial Some spyware can change computer settings, which could lead to slow
information internet connection speeds or changes in web browser settings. computers infected by bot malware .

, Social engineering
Type of social engineering Why it is used How it works
Phishing It tries to get users to input their credit or debit card Common targets for phishing are banks, building society and insurance websites
numbers, or fake security details or log-in details into a fake attackers send out an email or SMS that pretend to be from a bank. A link is con
website which the user is asked to click on and takes them to a fake website.

Pretexting A cybercriminal lies to get data or information It usually involves a scam where the criminal pretends to need the information t
of the person they are talking to

Baiting Tries to get victims to give cybercriminals the information Similar to phishing where the cybercriminals make a promise of goods to get the
they need need. An example is a promise of free downloads of films or music in return for

Quid pro quo Tries to disable anti-virus software updates, usually malware, Very similar to baiting however it is a promise of a service rather than goods. A c
can be installed to gain access to a computer system telephone call claiming to be from an IT service provider. These people offer ass
problems

Tailgating/Piggybacking It means trying to gain access to a secure building or room It takes the form of someone who doesn’t have the authority to enter a building
someone who does such as a delivery person

Shoulder surfing Aims to steal data and information It is when a person’s private or confidential information is seen by standing very
is effective in crowded places when a person uses their smartphone and log-in d


Hacking
White hat hacking
This is when the hacker is given permission to identify any loopholes or vulnerabilities of a computer system.
Grey hat hacking
This is when a hacker hacks for fun or to troll without any malicious intentions towards the computer system. If this hacker finds weaknesses they may ask to fix it for a fee.
Black hat hacking
This is when the hacker has malicious intentions and could possibly exploit and sell the data stolen. They can be prosecuted under UK IT legislations.
Distributed Denial of Service (DDoS)
It is an attempt to make a computer system or network unreliable to its users by flooding it with network traffic. It is usually focused on preventing an internet site or service
efficiently or at all either temporarily or indefinitely. These mainly happen on high-profile web servers such as banks payment websites (PayPal) and phone companies.
Pharming
A cyber-security attack that tries to redirect visitors from a genuine website to a fake one usually done without the consent of the users. There are similarities between phar
but phishing attacks use fake or hoax emails.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller abdulmajidmohamed1. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £5.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

52928 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£5.49
  • (0)
Add to cart
Added