Types of threats

published by Yildun Cloud Backup 2014-11-17
topic: Viruses

Warm
It is a program that is self-replicating, does not infect files and it's aim is to spread and affect a large number of computers. We can detect that we have a worm in our system, for example when the resources of the system are consumed and makes that the tasks do not be execute or be very slow.

Trojan
It is a malware that tricks the user looking like a seemingly harmless program (emails, pictures, music ...) but when run creates a backdoor that allows remote access to the attacker. It is composed by two files (client that sends orders and server who executes them).

Logic Bomb
It is a part of code in a program that remains hidden until a predetermined moment (a date, a command, an event) is triggered.

Boot Virus
They infect boot sectors of CD, DVD, USB, hard drives and even tables of partitions of the discs. It does not infect files, the virus will be activated when the system starts, infecting the hard disk that contains it.

Social Engineering
It is a technique of obtaining information, manipulating the innocent user. With the increase of e-mail, websites and social networks, it is increasingly common to find deceptions to obtain confidential data such as: passwords, card numbers, etc. Some examples of this type of deception are: phishing, chain emails, renewal of the access to a website, or even by a phone call.

reference: www.slideshare.net/YildunCloudBackup/tipos-de-amenzas-informticas

1

Latest Posts

Subjects

Send us your post