Malicious Software in EECS710 Information Security
Computer Security Malware and Countermeasures
Summarizing key concepts and protective strategies against malicious software.
Types of Malware
Overview of various malware classes and their characteristics.
Viruses
Malicious code that attaches to host files and spreads to other systems.
Worms
Stand-alone malware that replicates across networks without user action.
Rootkits
Software tools that enable unauthorized access and control over a computer system.
Trojans
Disguised as legitimate software, these programs create breaches for exploitation.
Spyware
Malicious software designed to collect and transmit personal information stealthily.
Ransomware
Software that encrypts data, demanding payment for the decryption key.
Infection Methods
How malware breaches systems and spreads.
Email Attachments
Common method for delivering malware to users via deceptive emails.
Drive-by Downloads
Unintentional download and installation of malware from compromised websites.
USB Devices
Portable drives used to transfer malware between unconnected systems.
Phishing Links
Deceptive URLs designed to fool users into downloading malware.
Exploit Kits
Software tools that exploit security holes to inject malware into systems.
Social Engineering
Techniques used to trick users into voluntarily compromising security.
Countermeasures
Strategies to defend against malware.
Antivirus Software
Programs designed to detect, quarantine, and remove malicious software.
Firewalls
Network security systems that control incoming and outgoing network traffic.
Security Updates
Regularly released software patches to fix vulnerabilities and enhance security.
User Education
Training to increase awareness of security best practices and threats.
Data Backup & Recovery
Methods to ensure data integrity and availability after a malware infection.
Intrusion Detection Systems
Tools to monitor networks for malicious activities or policy violations.