Cyber Security Assignment 1
Cyber Security Assignment 1
" Avihs is
Ca type of malictous softwJahe (malware) thot
attuches itsel! to Aagitimate phogam feles and aeplicakes
tbsee? by
trom nemodifyging othen þhoghama infeting fila. aheIt can spraad
computer to another whun infected fles Share.
" Vinues Can Cause
CONupting deleting vaniety
files, hasmfud efecs, ncluding
stealing dota, nsable syaem
heratio and eveh Vhendeing a cbmputer inupting
Unlike wOrms, vinuse requie humen
execut an infected þogham. Cnevention to spraad, suh
iy Wonmsi
WoHms e tandalone maliciouy prbgam Ehat eplicafes
themselves
without
and spkead acsoss netohks on
thhough the internet
aguihing human
in operahing systems, netwokkinterventon. They explott vulnerabili ties
Computey. proto co, or Xoftwa to infect cthua
Worm Can
(ompute andpropaqate
casing rapidly, infecting large
widespredd langesuch
numbers cenauminsy
oft
netoo banduidt cishuptìng service alble, ok instading backdooxs
fon
Unlike
access
viHuses, ohns do not nead to attach themseles to
existing files phoghäm to spead.
i) Taofan Horae;
"A Trojan Horse, ok Trojan, is a type of malwe clisg uised
or fles to trick wses into habaling
Oh e~ecting them. Unlike vihse and wOkÍn, Toj and do no
keplicate themseles b but hely engineng tehnique
to spraad.
Once intall, Inoj aN can perfom vanio uy maliious actvilies.
uch as stealing aensti ve information, tnatalliA other
modi tying oh moluwau
to the tocke.
delehng ls and ganing lunauthonizd acea
Common typ o Thojay inlde amote acos Thojans (RATEl
hih cte backdooy foh attacke to conthol comphomibed
syslems tamotuly
ivy Backdookt
" A back doon a hidden enthy point in a computea Syetem
Joftwa application that allous unauthonized accey ot contol
he often cuated intentionally by
Over the dystem Backdoohd ahe
de velohe fon egitmate pwpo ses, such as dystem madtenanu
Or debugging, bu they can aldo be erploitet by ctackav fon
maliciou punposes.
Attacku may instal backdooS thnough maluene, erploiting secunity
sing weak paswONd. Once a backdoo
installing attachers can gain hemote access to th oystem by
passingnormal Quthentication me chanim.
Backdoohs con be used to steal sent tive infomation, launch
futher attack install additiona malae, Oh control Compaamsel
byotems fon uanou malicious ativities.
Ques2 Explain -
9 Steganogaphy
Jteganogathy is a phactee of comcealing a masage 4le, on
dota within another mesdage, le, oh data in such a
that the existing the hiddan infometion is not acily pf
make it
Unlike coyptoqaphy ,which focus on enoyping data to aims
unititetligibe to unauthonized patted ateganogaphy to
hide the existence o the infohm ation itzelf.
" Comnon metody of steqanoqrabhy inducing embesding tert oN
images witin othes iogeaking the exst sifea
bit o ciqta fle hidin data in audio tile, o even waig
nvizble ink on document.