Threats Assignment
Threats Assignment
2
Table of Contents
Malware 4
identity Theft 5
𝐕𝐢𝐫𝐮𝐬𝐞𝐬 7
Spyware 8
Trojans 9
Worms 10
Adware 11
Ransomware 12
Cyberterrorisms 13
Bibliography 14
3
Malware
Malware also known as malicious software is the term used to describe
harmful and intrusive software developed by hackers to control and harm
your computer. There are types of malwares which include ransomware,
spyware, worms and trojans . Malware can be installed secretly by hackers
on the computer to gain unauthorized access. As a result of these
softwares being created, hackers are able to get sensitive and personal
information on a person. One can install an antivirus software such as
Norton 360 and frequently update and backup files on your computer
Identity Theft
Identity theft is a crime and a form of fraud where a criminal tends to
gather personal information on an individual and pretends to be them.
They obtain the person’s full name, address, passport number, family,
nationality, date and country of birth, credit card details and insurance
accounts and get benefits from medical care. Furthermore, They mainly
perform this crime through electronics but some sift through garbage bin
search for credit card and bank account statements. Moreover, you should
secure your credit card and personal information and remove old deposit
slips.
4
Credit card fraud
𝐕𝐢𝐫𝐮𝐬𝐞𝐬
5
Spyware
It is a type of malware intended to gather data on users without their
consent and knowledge. Its purpose is to spy and monitor the activity the
user undertakes on their computer. It allows hackers to see your
conversations, the data you send and receive, what websites you visited.
The hacker's intention is usually to send that information to a third party.
Avoid clicking on ads that pop up and install antivirus software.
Trojans
Like the infamous greek horse, Trojan is a computer malware that is
programmed to disguise itself as a harmless and safe program the user is
interested in and tricks them into switching it on to delete files and erase
your hard disks. They are also designed to spy and gather information on
a user to send to the developer. You can keep a firewall up to stop Trojan
from downloading into your computer and avoid clicking on pop up ads.
6
Worms
A malicious software program that reproduces itself spreads through
computers from another computer. It uses your internet and network
connection as they have no security and uses them as a host to infect and
jump to other computers. Furthermore, it supposedly can change their
profile to avoid detection. They use ‘payloads’ to assist them spread into
the computer faster and it overloads web servers. You can avoid these by
placing security measures on your computer and disconnecting your
computer if infected from the internet.
Adware
Another type of malware that automatically downloads itself onto the
user's computer without his/her knowledge. It refers to a program which
displays pop-up advertisements on your screen . Some adware comes in
the form of a browser extension or add-ons and sends frequent pop-ups. It
can slow down your computer and reduce your battery life. While it
distracts you with these ads it generates revenue to its developer. You
can run a scan and update your computer by date and block random pop-
up ads.
7
Ranso
mware
A type of malware that threatens the user to publish personal data and
blocks the user from gaining access to their data on their computer.
Hackers blackmail the user to pay a ransom fee to regain access to their
files. They usually have a timer, telling the user how much time they have
to pay and if they are not able to, they would lose their files. Never click
on unsafe links and use VPN services on public wifi networks to make the
device less vulnerable.
Cyberterrorisms
It is an act where hackers threaten and perform violent acts to coerce a
government or monetary resources through intimidation. It is performed
via the internet and can cause harm and destruction to personal
objectives. Nevertheless, it causes deaths and loss of properties.
Cyberterrorists who are skilled at hacking can damage the government
system and worldwide economic chaos. Ensure to secure wifi, browsers
and turn off computers when not in use.
8
Bibliography
Websites:
● https://www.wikipedia.org/
● https://www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-
malware.html#~what-is-malware
● https://www.proofpoint.com/us/threat-reference/ransomware
Books:
● Log on to IT
● Heinemann Information and Technology for Csec