Unit 3 - Viruses and Malware Assignment
Unit 3 - Viruses and Malware Assignment
Unit 3 - Viruses and Malware Assignment
Malware
Assignment
By
Osa Omoigui
01 What is a computer risk?
COMPUTER RISK
A Computer risk, is software that is installed onto someone’s computer that can cause serious damage to it and cause
multiple problems for the user. This software’s is unwillingly/unknowingly implanted into the user’s computer by
malicious sources that aim to use this information to benefit themselves, even if it’s to the user’s dismay.
WHAT DOES IT DO
Malware disrupts the computer and network when it is installed into the victim’s system without their knowledge.
When it is installed it is capable of troublesome actions in order to complete their mission. These actions include but
are not limited to:
3
A computer virus is a malicious program that
has the capacity to duplicate itself without the
permission of the user. It can attach to
documents, code, and other files aswell. Thus
when you have have a virus it is common that
when you try to open a application, you will
receive dozens of pop-ups, or the application
won’t open at all, it is because it is already
corrupted. Viruses can spread from computer
to computer via advertisements, emails, and
downloading from sketchy websites. Once a
virus is activated from being dormant, it can
gain control of both your system and your
information. It can also cause harm to other
files / programs.
SYMPTOMPS:
- Slow response times
- Random hard drive crashes
- Pop-up ads
FUN FACTS
(Youtube llink)
- At its peak, it was sent to 1/12 emails sent.
- Blocked companies from accessing their websites.
- Shut down google for one day.
- Cost 38.4B dollars in damages.
04 What is a trojan horse?
STORM WORM
A trojan horse is a faulty code / software that
disguises itself as harmless and helpful when in
reality it is capable of doing serious damage to your Affects
system or network, such as such as damaging Storm Worm would affect millions of computers by sending copious amounts
of spam mail which led to virus infected websites.
stealing or disrupting info and programs on your
system. It is capable of doing such damage because
of the high privileges and authority the victim
unknowingly grants the malware. They are hard to What Damage Did It Do
Storm Worm turned around 5-50 million computers into zombies, it is not
detect because of the resources they were given.This known how much damage was done financially.
malware is named trojan horse because it usually
comes in the form of something that does not seem
suspicious. Such as the horse gifted by the greeks How did it Work?
that was used to infiltrate troy, the virus usually It opens a backdoor in the computer which allows remote control, while also
comes in the form of an email, that conceals the installing a rootkit that hides the malicious program.
virus.
Creator/Motive
The Storm Worm was traced back to Russian hackers, that were motivated
by money. Researchers have concluded that a Russian hacker group in St.
Petersburg were behind Storm.
04 What is a Rootkit
A Rootkit is a collection of malware that is hidden deep within the
operating system of a computer. It changes code and data structures
of the operating system to enact damage by altering the firewalls,
antivirus protection, and system files, thought its main purpose is to
provide the hacker with administrative access to the systesm. It also
changes the ouput so that traces of the malware can not be noticed, it
can conceal the presence of other program and malware aswell.
Though similar, a Trojan Horse virus and a Rookit differentiate in
that a Trojan horse’s main objective is not to provide the hacker with
administrative protocol. Finally, because removal of a rootkit with an
anti-virus program is close to impossible, specialized rootkit removal
skills will required but a complete system re-install also works.
Sony Rootkit
Social Engineering is both a powerful and common method of
02
FEATURES OF
THE TOPIC
You can enter a subtitle if you
need it
Sony Rootkit
ALTERNATIVE RESOURCES