Friday, 11 December 2015

Security Threats Types

The root cause of all security threats is malware which is basically a malicious software code designed to disrupt, harm or whip the Internet and Software world. Based on the design of malware these are categorized into various categories viz. Virus, worm, trojan and boots. These malware are as such powerful that if designed then they can cause a huge data and financial loss. The question remains – how to save from such threats? You know it, by knowing about it.

The word ‘Malware’ means malicious software that pretty much means everything that harms computers or network. The application of malware is completely based on its designed and purpose, as some are designed to corrupt computer memory, some to replicate itself, some  logging keyboard keystrokes, some steal financial information, some act as a backdoor and so much more. Therefore, based on the use and purpose the malware is categorized as followings:

DIFFERENT SECURITY THREATS

SECURITY THREAT #1: VIRUS

A Virus is a malicious program that replicates itself from one location to another, or even from one system to others though copying of files or through network.
Commonly, most of the viruses are executable, but can come in varieties of tastes like macros, autoruns or even as a simple file in some cases. However, the root cause remains the same as the main purpose is either to delete files or corrupt files.
Virus Awareness: Say, you’re downloading a video of format ‘.flv’, but if you see the download file extension as ‘.flv.exe’ then you can be dealing with the virus. Stay tuned!
To stay on the safe side, install an anti-virus program and keep it updated and do not introduce malicious file and software into your system.

SECURITY THREAT #2: WORMS

Worms are no much different then virus in a feature that worms replicate themselves and can cause the same level of destruction as virus can. However, worms are standalone malicious program that affects the system by exploiting vulnerability or in most cases, though social engineering where user sis forced to download worms though email or by clicking some link.
Although, worms are sub-version of virus but are as much powerful because of their capability to replicate themselv enormously though network      , system memory or causing web server to not respond.
Examples: W32.SillyFDC.BBY, Vecna.22528 and W32.MyLife.C@mm

SECUITY THREAT #3: TROJANS

Hacker’s first choice – Trojans! Trojans are a peace of harmful code that are designed to control almost the whole of the system when tricked to install. It looks like genuine software, but when activated can achieve a number of attacks from irritating dialogue boxes to damaging the complete system.
Commonly, Trojans are downloaded from email attachments, running certain programs in internet or come bundled with sound looking software.

SECURITY THREAT #4: BOTS

Bots are not basically a malicious thing. Bots are derived from word ‘robot’, and can be used for both good and bad purposes. Typically, bots are used in web crawlers over search engines or for creating an automated system for messaging and other web productions.
However, when designed malicious Bots can do a lot more than other form of malware. One can choose to create a botnet for instance, which is a collection of bots from list of compromised system and network to be used as desired, be it – distributed denial of service attack, gather financial information, relay spams, flooded traffic to crash server and so forth.

On top of aforementioned, there exists various  types of other malware like spyware (a program to collect your information without your knowledge), scareware (a program that pretends like an antivirus program, but when loaded infects your system with hundreds of virus), exploit (a simple piece of code that exploit particular vulnerability of a particular system), backdoors (a program that allows a secret and bypassed access to to your system) and the list is on going as security and hacking is undergoing a great fight. Choose your side of the fence and stay tuned!