HS

Cards (24)

  • UNWANTED BEHAVIOR
    • The software executes undesirable programs on the computer
    • It does not show enough information about its behavior
    • It gets improper consent from the user
  • ADVERTISING
    • It advertises a product or service
    • It interferes with the user while operating the computer
  • PRIVACY
    • It keeps track of programs or software installed on the computer
    • It saves or transmits the activities performed by the computer without consent from the user
  • Types of Potentially Unwanted Programs (PUPs)
    • POTENTIALLY
    • UNWANTED
    • PROGRAM
  • INSTALLATION
    1. Becomes part of a system
    2. Alters the system
    3. Enables its code to run or during start-up
  • SURVEYING
    Looks or searches for another software target inside the computer system
  • REPLICATION
    Becomes part of the software installed on the computer system
  • CONCEALMENT
    1. Hides its presence from the user
    2. Prevents its removal from the system
  • INJECTION
    1. Becomes part of the code or data of harmless programs inside the system
    2. Acquires privileges
    3. Conceals itself
  • PAYLOAD
    1. Alters something on the system
    2. Transmits data to other computers
    3. Accepts commands from other computers
  • ADWARE
    A type of malicious software that secretly installs itself on your device and displays unwanted advertisements and pop-ups
  • SPYWARE
    A type of malicious software that secretly monitors and collects information about a user's activities on their computer or device without their knowledge or consent
  • Information collected by spyware
    • Keystrokes
    • Browsing habits
    • Personal information
  • Domestic spyware
    Software that computer users install to keep track of the behaviour of Internet on their computers, often used by employers to monitor employee online activities
  • Commercial spyware
    Software that organizations use to monitor a computer user's browsing activities, which they then sell to marketers
  • Computer virus
    A malicious software that infects computer systems, causing damage to files, software, or the system
  • Types of computer viruses
    • Boot sector virus
    • Program virus
    • Multipartite virus
    • Stealth virus
    • Polymorphic virus
    • Macro virus
    • ActiveX virus
    • Boot Sector Virus - Boot sector viruses infect the master boot record (MBR) or the boot sector of a storage device, such as a harddrive or a USB drive.
    • Program Virus - Infects executable files or programs on a computer system. When a user executes an infected program, the virus activates and may replicate itself by embedding its malicious code into other executable files.
    • Multipartite Virus - can infect both executable files and boot sectors. They are capable of spreading through multiple methods, making them particularly resilient and challenging to remove.
    • Stealth Virus - viruses conceal their presence and activities to evade detection by antivirus software.
    • Polymorphic Virus - have the ability to change their code or appearance each time they infect a new file or system, making them more difficult to detect byantivirus software.
    • Macro Virus - are written in macro language and infect documents or templates that support macros, such as those created in Microsoft Word or Excel.
  • ActiveX Virus – Because most users do not know how to setup ActiveX and Java controls it leaves a potential security hole