In: Computer Science
Describe leading threats (Virus, Worm, Trojan Horses, Rootkits, Social Engineering, and Botnet).
Leading threats - A threat can be defined as an object, person, or other entity that represents a constant danger to an asset. Threats can attack, infect network and steal the data from computer system . leading threats are trying to find new ways to steal and harm data.
Virus - - A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Some viruses may cause only mildly effects while others can damage your hardware, software or files.
Virus signs:
System is hanging
Slower internet processing slower applications
Unusual messages
Sudden crashes
Pop ups
Strange activity and actions
Worm-- it is used to attack network. Worm is a program capable of replicating itself on a computer network. A worm also does not require a host as it is a self contained program. They generally travel from one computer to another across communication links on a network. Worms almost cause atleast some harm to the network whereas viruses almost always corrupt or modify files on a targeted computer.
Trojan horses - - it is a type of malware design to provide unauthorised remote access to a user's computer. They are fake softwares to infect the system.trojans leave the computer system unprotected.
When run, appears to do something useful but will also secretly perform hidden actions.
Rootkits-- Rootkit is a piece of malware that is installed by a hacker that gives them complete control of your computer system. This is nearly undetectable malware. Rootkit is a type of malware which can harm not only your software but also hardware.
Types of rootkits--
Hardware rootkit - it can hide itself in hardware of computer. it can also harm router and it can read data of harddisk
Boot loading - when u start your system, it can replaces or modify the boot loader with another one. They are serious threads because they can be used to hack passwords.
Memory rootkit--these rootkits exist in your computer's memory( RAM). this can stay for years without your knowledge.
Application level rootkit - it changes standard application files with rootkit files inside the computer.
Kernel rootkit - they are created for replacing portions of the code in Kernel. Kernel is the core of Computer. Kernel rootkit targets the kernel of Computer system.
Software engineering - - it is defined as systemic, disciplined and quantifiable approach. For the development operation and maintenance of software. Software that can run efficiently on real time machine. Software engineering is the process to design, build and analyze objects by using knowledge and principles in a systematic way.
Characteristics of software - -
1.software is developed or engineered. it is not manufactured.
2. Softwares does not ware out.
3.software is custom built.
Botnet - -it is a collection of bots remotely controlled and working together to perform tasks. it can harm computer system. It can steal your data. (Botnet = robot +network) A botnet is a large number of compromised computers that are used to generate spam, relay viruses or flood a network or web server with excessive requests to cause it to fail.