loading...

Malicious Software in EECS710 Information Security

Computer Security Malware and Countermeasures

Summarizing key concepts and protective strategies against malicious software.

Types of Malware

Overview of various malware classes and their characteristics.

Viruses

Malicious code that attaches to host files and spreads to other systems.

Worms

Stand-alone malware that replicates across networks without user action.

Rootkits

Software tools that enable unauthorized access and control over a computer system.

Trojans

Disguised as legitimate software, these programs create breaches for exploitation.

Spyware

Malicious software designed to collect and transmit personal information stealthily.

Ransomware

Software that encrypts data, demanding payment for the decryption key.

Infection Methods

How malware breaches systems and spreads.

Email Attachments

Common method for delivering malware to users via deceptive emails.

Drive-by Downloads

Unintentional download and installation of malware from compromised websites.

USB Devices

Portable drives used to transfer malware between unconnected systems.

Phishing Links

Deceptive URLs designed to fool users into downloading malware.

Exploit Kits

Software tools that exploit security holes to inject malware into systems.

Social Engineering

Techniques used to trick users into voluntarily compromising security.

Countermeasures

Strategies to defend against malware.

Antivirus Software

Programs designed to detect, quarantine, and remove malicious software.

Firewalls

Network security systems that control incoming and outgoing network traffic.

Security Updates

Regularly released software patches to fix vulnerabilities and enhance security.

User Education

Training to increase awareness of security best practices and threats.

Data Backup & Recovery

Methods to ensure data integrity and availability after a malware infection.

Intrusion Detection Systems

Tools to monitor networks for malicious activities or policy violations.

login
signup