0% found this document useful (0 votes)
9 views15 pages

Chap 3 (Cyber Security)

Malware, or malicious software, is designed to harm or gain unauthorized access to computer systems, with various types including viruses, worms, and ransomware. It spreads through methods like phishing emails and infected websites, and recognizing signs of infection is crucial for timely intervention. Protecting against malware involves using antivirus software, safe browsing practices, and regular data backups.

Uploaded by

shouvikmaity815
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views15 pages

Chap 3 (Cyber Security)

Malware, or malicious software, is designed to harm or gain unauthorized access to computer systems, with various types including viruses, worms, and ransomware. It spreads through methods like phishing emails and infected websites, and recognizing signs of infection is crucial for timely intervention. Protecting against malware involves using antivirus software, safe browsing practices, and regular data backups.

Uploaded by

shouvikmaity815
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

1.​WHAT IS MALWARE?

Malware, short for "malicious software," is any software designed to harm, disrupt, or
gain unauthorized access to computer systems, networks, or devices. Here's a
breakdown:

●​ Purpose:​

○​ Malware aims to compromise the confidentiality, integrity, or availability of


information.
○​ Cybercriminals use it for various malicious purposes, including stealing
sensitive data, extorting money, or disrupting operations.
○​
●​ Types of Malware:​

○​ Viruses: These replicate themselves by attaching to other programs and


spreading when those programs are executed.
○​
○​ Worms: These can self-replicate and spread across networks without
requiring user interaction.
○​
○​ Trojans: These disguise themselves as legitimate software but carry
malicious payloads.
○​
○​ Ransomware: This encrypts files and demands payment for their
decryption.
○​
○​ Spyware: This secretly monitors user activity and collects
sensitive information.
○​
○​ Adware: While some adware is just annoying, malicious versions can
contain spyware, or other harmful payloads.
○​
○​ Botnets: Networks of infected computers controlled remotely by
attackers.
○​
○​ Keyloggers: Software that records every key stroke a user makes.
○​
○​ Fileless Malware: Malware that does not rely on files, and operates in a
computers memory.
○​
●​ How Malware Spreads:​

○​ Phishing emails: Tricking users into clicking malicious links or opening


infected attachments.
○​
○​ Infected websites: Exploiting vulnerabilities in web browsers or websites.
○​
○​ Software vulnerabilities: Taking advantage of weaknesses in software.
○​
○​ Infected USB drives or other removable media.
○​
○​ Downloading infected files.

In essence, malware is a significant threat to digital security, and understanding its


various forms and methods of spread is crucial for protecting against it.

2.​DISCUSS THE DIFFERENT TYPES OF VIRUSES.


It's important to distinguish between "viruses" and "malware" in general. Viruses are a
specific type of malware. Here's a breakdown of different types of computer viruses:

Key Characteristics of Viruses:

●​ Replication: Viruses need a host program or file to replicate. They insert their
malicious code into other files.
●​
●​ Activation: They often require user interaction (like opening an infected file) to
activate.

Here are some common types of computer viruses:

●​ Boot Sector Viruses:


○​ These infect the boot sector of a hard drive or removable storage device.
○​
○​ They activate when the computer starts up, potentially preventing the
operating system from loading.
○​
○​ Historically spread through floppy disks, now more commonly through
infected USB drives.
●​ File Infector Viruses:
○​ These infect executable files (like .exe or .com files).
○​
○​ When the infected program is run, the virus spreads to other executable
files.
○​
●​ Macro Viruses:
○​ These are written in macro languages (like those used in Microsoft Office
applications).
○​
○​ They infect documents (like Word or Excel files) and activate when the
document is opened.
○​
○​ They can spread rapidly through shared documents.
○​
●​ Polymorphic Viruses:
○​ These change their code each time they replicate, making them harder for
antivirus software to detect.
○​
○​ They use encryption and other techniques to alter their appearance.
○​
●​ Multipartite Viruses:
○​ These infect multiple parts of a system, such as both boot sectors and
executable files.
○​
○​ This makes them particularly difficult to remove.
●​ Memory-Resident Viruses:
○​ These viruses embed themselves into a computers memory.
○​
○​ From there they can infect other files that the computer accesses.
○​
●​ Direct Action Viruses:
○​ These viruses activate and spread when the infected file is executed.
○​ They do not normally reside in the computers memory.
●​ Overwriting Viruses:
○​ These Viruses overwrite file content, effectively destroying the original files
data.
○​

Important Notes:

●​ Antivirus software plays a crucial role in detecting and removing viruses.


●​
●​ Safe computing practices, such as avoiding suspicious downloads and being
cautious of email attachments, are essential for prevention.
●​
●​ The landscape of malware is constantly evolving, with new threats emerging
regularly.
3.​DISCUSS THE INDICATION OF MALWARE ATTACKS.
Recognizing the signs of a malware attack is crucial for timely intervention and
minimizing potential damage. Here are some common indicators that your device might
be infected:

Performance Issues:

●​ Slow performance: A noticeable slowdown in your computer's speed, even for


simple tasks, can be a red flag.
●​ Frequent crashes or freezing: If your system crashes or freezes more often
than usual, it could be a sign of malware interference.
●​ Overheating: Unexplained overheating of your device, even when not
performing demanding tasks, can indicate malicious background activity.

Unexpected Behavior:

●​ Unusual pop-ups and ads: An excessive number of pop-up ads, especially


those that are intrusive or inappropriate, can indicate adware or other malware.
●​ Changes to browser settings: If your browser's homepage or search engine
has changed without your consent, it might be a sign of a browser hijacker.
●​ Unexpected toolbars or extensions: The appearance of new toolbars or
browser extensions that you didn't install.
●​ Suspicious activity: Unusual network activity, such as increased data usage or
unexpected connections, can indicate malware communication.
●​ Missing or corrupted files: If files are missing, corrupted, or encrypted, it could
be a sign of ransomware or other malicious activity.
●​ Disabled security software: Malware can sometimes disable antivirus or
firewall software, leaving your system vulnerable.
●​ Unexpected emails or social media posts: If your accounts are sending out
emails or social media posts that you didn't create, it could indicate that your
accounts have been compromised.
●​ Unfamiliar programs running: If you see programs running in the background
that you don't recognize, they could be malicious.

Other Warning Signs:


●​ Increased network activity: If your network usage is much higher than normal,
and you are not downloading large files, this could be a sign of malware.
●​ Unexplained loss of disk space: Malware can take up hard drive space, so a
sudden decrease in available space could be a warning sign.
●​ Requests for ransom: This is a clear indicator of a ransomware attack.

Important Considerations:

●​ It's important to note that some of these signs can also be caused by other
issues, such as hardware problems or software glitches.
●​ If you suspect a malware infection, it's crucial to take immediate action to prevent
further damage.

By being aware of these indicators, you can take steps to protect your devices and data
from malware attacks.

4.​HOW TO PROTECT VIRUS ATTACKS?


Protecting your devices from virus attacks requires a multi-layered approach. Here's a
comprehensive guide:

1. Install and Maintain Antivirus and Anti-malware Software:

●​ Reliable Software:
○​ Invest in reputable antivirus and anti-malware software.
○​ Ensure it provides real-time scanning, detection, and removal capabilities.
○​
●​ Regular Updates:
○​ Keep your antivirus software updated with the latest virus definitions. This
ensures it can recognize and combat new threats.
○​
○​ Set up automatic updates.
○​
●​ Scheduled Scans:
○​ Perform regular full system scans to detect and remove any hidden
malware.
○​

2. Keep Software and Operating Systems Updated:

●​ Operating System Updates:


○​ Install operating system updates (Windows, macOS, etc.) promptly. These
updates often include security patches that address vulnerabilities.
○​
○​ Enable automatic updates.
○​
●​ Software Updates:
○​ Keep all software applications (browsers, plugins, etc.) up to date.
○​
○​ Outdated software is a common target for exploits.
○​

3. Practice Safe Browsing Habits:

●​ Avoid Suspicious Websites:


○​ Be cautious of websites with suspicious URLs or those that offer free
downloads of pirated software.
●​ Don't Click on Unknown Links:
○​ Avoid clicking on links in emails, social media, or websites from unknown
sources.
○​
●​ Be Wary of Pop-ups:
○​ Close pop-up windows instead of clicking on them, especially those that
claim your computer is infected.
○​

4. Be Cautious with Email Attachments:

●​ Verify Sender:
○​ Only open email attachments from trusted senders.
●​ Scan Attachments:
○​ Scan all email attachments with your antivirus software before opening
them.
○​
●​ Avoid Unexpected Attachments:
○​ Be very wary of any unexpected email attachments, even if they appear to
come from someone you know.
○​

5. Use a Firewall:

●​ Enable Firewall:
○​ Enable your operating system's built-in firewall or use a dedicated firewall
application.
○​
●​ Configure Firewall:
○​ Configure your firewall to block unauthorized access to your computer.
○​

6. Practice Safe Downloading:

●​ Download from Trusted Sources:


○​ Only download software from official websites or reputable app stores.
○​
●​ Read Reviews:
○​ Read reviews and research software before downloading it.

7. Back Up Your Data Regularly:

●​ Regular Backups:
○​ Back up your important files regularly to an external hard drive, cloud
storage, or other secure location.
●​ Offline Backups:
○​ Keep backups offline, or off of the network, so that if ransomware does
infect your computer, your backups will also not be infected.
○​

8. Use Strong Passwords:

●​ Complex Passwords:
○​ Use strong, unique passwords for all your online accounts.
○​
●​ Password Manager:
○​ Consider using a password manager to generate and store your
passwords securely.
○​

9. Educate Yourself:

●​ Stay Informed:
○​ Stay up-to-date on the latest malware threats and security best practices.
●​ Educate Others:
○​ If you are responsible for other users, educate them on safe computer
practices.
By following these guidelines, you can significantly reduce your risk of falling victim to
virus attacks.

5.​WHAT IS COMMAND INJECTION?


Command injection is a type of security vulnerability that allows an attacker to execute
arbitrary operating system (OS) commands on a server running an application. Here's a
breakdown:

How it Works:

●​ Vulnerable Applications:
○​ Applications sometimes need to execute OS commands to perform certain
tasks.
○​ If an application doesn't properly sanitize user-supplied input before
passing it to the OS, an attacker can inject malicious commands.
○​
●​ Exploitation:
○​ Attackers insert OS commands into input fields, such as form fields, URLs,
or HTTP headers.
○​
○​ The vulnerable application then executes these injected commands, giving
the attacker control over the server.
○​
●​ Consequences:
○​ Attackers can gain unauthorized access to sensitive data.
○​
○​ They can modify or delete files.
○​
○​ They can even take complete control of the server.
○​

Key Points:

●​ Command injection occurs when an application passes unsanitized user-supplied


data to a system shell.
●​
●​ It differs from code injection, where an attacker injects their own code into the
application.
●​
●​ Insufficient input validation is the primary cause of command injection
vulnerabilities.
●​

Prevention:

●​ Input Validation:
○​ Sanitize all user-supplied input to remove or escape potentially dangerous
characters.
○​
○​ Use whitelists to restrict input to only allowed characters or values.
○​
●​ Avoid System Calls:
○​ Whenever possible, avoid calling OS commands directly from the
application.
○​ Use built-in functions or libraries that provide safer alternatives.
○​
●​ Principle of Least Privilege:
○​ Run applications with the minimum necessary privileges to limit the
potential damage of a successful attack.
○​
●​ Secure Coding Practices:
○​ Stay up-to-date on secure coding practices and regularly audit code for
vulnerabilities.
○​

In essence, command injection is a serious security risk that can have devastating
consequences. By understanding how it works and implementing proper security
measures, developers can protect their applications and servers from this type of attack.

6.​WHAT IS CROSS SITE SCRIPTING?


Cross-site scripting (XSS) is a type of web security vulnerability that allows an attacker
to inject malicious scripts into web pages viewed by other users. Essentially, it tricks a
user's browser into executing code that the attacker provides, under the guise that it's
legitimate code from the website they're visiting.

Here's a breakdown of key aspects:

How it Works:

●​ Vulnerable Websites:
○​ XSS vulnerabilities arise when a web application doesn't properly sanitize
user-supplied input. This means that if a website allows users to input data
(e.g., in comments, search bars, or forms) and then displays that data to
other users without checking it, an attacker can insert malicious code.
○​
●​ Malicious Scripts:
○​ Attackers typically inject JavaScript code, but they can also use other
client-side scripting languages.
○​
●​ Attacking the User:
○​ When a victim visits the compromised web page, their browser executes
the attacker's script. Because the script appears to come from the trusted
website, the browser treats it as legitimate.
○​

Types of XSS:

●​ Stored XSS (Persistent XSS):


○​ The malicious script is stored on the server (e.g., in a database, message
forum, or comment field). When other users visit the affected page, the
script is executed.
○​
●​
●​
●​ Reflected XSS (Non-Persistent XSS):
○​ The malicious script is reflected off the web server, such as in an error
message, search result, or other response that includes some or all of the
input sent to the server as part of the request.
○​
●​ DOM-based XSS:
○​ The vulnerability exists in the client-side script itself. The attacker
manipulates the Document Object Model (DOM) to execute malicious
code in the user's browser.
○​

Potential Consequences:

●​ Session Hijacking:
○​ Attackers can steal session cookies, allowing them to impersonate users.
○​
●​ Data Theft:
○​ They can steal sensitive information, such as login credentials or personal
data.
○​
●​ Website Defacement:
○​ They can modify the content of the website.
○​
●​ Malware Distribution:
○​ They can redirect users to malicious websites or install malware on their
computers.
○​

Prevention:

●​ Input Validation and Sanitization:


○​ Carefully validate and sanitize all user-supplied input to remove or escape
potentially dangerous characters.
○​
●​ Output Encoding:
○​ Encode output before displaying it to users to prevent browsers from
interpreting it as executable code.
○​
●​ Content Security Policy (CSP):
○​ Implement a CSP to control which resources the browser is allowed to
load.
○​
●​ Use of Frameworks:
○​ Many modern web development frameworks have built in XSS protection.
○​

XSS is a serious threat, and developers must take appropriate measures to protect their
web applications.

7.​WHAT IS FIREWALL?
A firewall is a network security system that monitors and controls incoming and outgoing
network traffic based on predetermined security rules. Essentially, it acts as a barrier
between a trusted internal network and an untrusted external network, such as the
internet.

Here's a breakdown of its key functions:

●​ Traffic Filtering:
○​ Firewalls examine network traffic (data packets) and decide whether to
allow or block it based on predefined rules. These rules can be based on
factors like:
■​ Source and destination IP addresses
■​
■​ Port numbers
■​
■​ Protocols (e.g., TCP, UDP)
■​
○​
○​
●​ Access Control:
○​ Firewalls control which devices and applications can access the network
and which network resources they can use.
○​
●​ Protection Against Threats:
○​ Firewalls help protect against various cyber threats, including:
■​ Unauthorized access
■​
■​ Malware
■​
■​ Network attacks
■​
○​
○​
●​ Network Address Translation (NAT):
○​ Many firewalls also perform NAT, which hides the internal IP addresses of
devices on a private network, providing an additional layer of security.
○​

Types of Firewalls:

●​ Hardware Firewalls:
○​ These are physical devices that are installed between a network and the
internet.
○​
●​ Software Firewalls:
○​ These are software applications that are installed on individual computers
or servers.
○​
●​ Cloud Firewalls:
○​ These are firewalls that are provided as a cloud based service.
○​
●​ Next-Generation Firewalls (NGFWs):
○​ These advanced firewalls offer more sophisticated features, such as
application-level filtering, intrusion prevention, and deep packet inspection.
○​

In essence, firewalls are a crucial component of network security, providing a first line of
defense against unauthorized access and malicious activity.

8.​WHAT IS BUFFER OVERLOAD?


A buffer overflow is a type of software vulnerability that occurs when a program attempts
to write more data to a buffer (a temporary storage area in memory) than it can hold.
This excess data overflows into adjacent memory locations, potentially corrupting or
overwriting other data or even executable code.

Here's a breakdown of the key concepts:

Understanding Buffers:

●​ In computer programming, a buffer is a region of memory allocated to hold data.


●​
●​ Programs use buffers to temporarily store data while it's being processed.
●​
●​ Each buffer has a fixed size, meaning it can only hold a specific amount of data.
●​

How Buffer Overflows Occur:

●​ A buffer overflow happens when a program tries to write more data into a buffer
than its allocated size.
●​
●​ This can occur due to programming errors, such as:
○​ Not checking the size of input data before writing it to a buffer.
○​
○​ Using functions that don't perform bounds checking (i.e., they don't ensure
data stays within the buffer's limits).
○​

Consequences of Buffer Overflows:


●​ Program Crashes: Overwriting critical data can cause a program to crash or
behave erratically.
●​
●​ Data Corruption: Overwriting adjacent memory locations can corrupt data used
by other parts of the program.
●​ Code Execution: Attackers can exploit buffer overflows to inject and execute
malicious code, potentially gaining control of the affected system. This is a
serious security vulnerability.
●​

Why Buffer Overflows Are a Security Risk:

●​ Attackers can craft input data that intentionally overflows a buffer, allowing them
to overwrite critical parts of the program's memory.
●​
●​ By carefully manipulating the overflow, attackers can inject their own code and
force the program to execute it.
●​
●​ This allows attackers to perform various malicious actions, such as:
○​ Gaining unauthorized access to systems.
○​
○​ Stealing sensitive data.
○​
○​ Installing malware.
○​

Prevention:

●​ Input Validation: Thoroughly check the size and format of input data before
writing it to a buffer.
●​
●​ Bounds Checking: Use programming techniques and functions that ensure data
stays within the bounds of the buffer.
●​
●​ Memory-Safe Languages: Use programming languages that have built-in
memory safety features.
●​ Address Space Layout Randomization (ASLR): This security technique
randomizes the memory addresses used by a program, making it harder for
attackers to predict where to inject malicious code.
●​
●​ Data Execution Prevention (DEP): This security feature prevents the execution
of code in certain memory regions, making it harder for attackers to execute
injected code.
●​

Buffer overflows are a classic but still relevant security vulnerability. Developers must
take precautions to prevent them.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy