Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
An organized and intentional attempt that looks for some weakness in the networks or computer systems both in software or hardware, to attack with the aim of damaging it, or obtaining some economic benefit.
Programs or code sequences -> vulnerabilities -> unforeseen effects.
1. Vulnerabilities: access to hackers.
2. Install malicious -> control the system.
• If there are no vulnerabilities, there is nothing to exploit.
Hackers can launch an exploit attack in a variety of ways:
-> discover
o user's operating system
o applications are running
TYPES
No prior access to the
system it attacks.
Require prior access.
Requires user action.
Zero day exploits -> unknown until the time of the attack.
Known exploits -> have already been discovered.
How to recognize an exploit attack :
- No typical signs that allow attacks to be recognized.
- Signs -> infection installed
To prevent hackers from using an exploit: software up to date.
Denial of Service Attacks (DoS and DDoS)
Paralyzing the system.
Purpose: disabling the victim's equipment or network indefinite period
- overload or saturation.
- Company´s servers.
Web servers - > certain number of simultaneous user requests or connections
Two techniques
difference -> number of computers or IPs.
Same time and same service -> difficult to detect
The computers
-> becoming bots or zombies
-> controlled by a cybercriminal.
routers.
Provider makes
sure that our router is
up to date with this
configuration.
-> protect network and infrastructure
-> avoid these attacks.
- Is an intrusive software designed to cause damage to computer equipment and systems.
- Includes: viruses, spyware, adware, ransomware, and other types of malicious software.
- It can enter a network through phishing, malicious attachments, malicious downloads, social engineering, or flash drives.
- Software that alters the funtion of any device, without the user’s permission to achieve malicious purposes.
- It is inserted into an application and runs when it is opened (it can steal confidential data).
- It spreads through infected websites, file transfers or downloads of email attachments, it will remain inactive until the infected file or program is activated.
- Appeared in 2010
- Is believed to have been used by the U.S. and Israeli governments to disrupt Iran’s nuclear program.
- It infected more than 20,000 equipment and ruined a fifth of Iran’s nuclear centrifuges, which delayed its program for several years.
- Reads passwords, records what you type on the keyboard or allows the entry of more malware that could even take de computer hostage.
- These actions include: deletion, blocking, copying and modification of data.
- They masquerade as files, with the goal of tricking people into clicking, opening, or installing them.
- Type of software that hijacks the browser or other parts of the system in order to flood it with unwanted advertisements.
- Purpose: generate earnings every time one of the shown ads is clicked. It is also spread by downloading “free” applications.
- It can present ads influenced to our interests, it can also sell browsing data to others.
- It infects the operating
system by preventing
access to certain parts,
folders or files and asks for
a ransom in exchange for
removing this restriction.
- It is spread by sending malicious emails, so that victims open an infected file or click on a link that takes them to the attacker’s website, where they get infected.
- It collects financial information.
- Some strains of spyware are also capable of activating cameras and microphones to see and hear you without your knowledge.
- It may have some valid uses, such as in companies, acquiring a security policy that allows the software to be used to monitor the use that employees make of computers and mobile devices.
- Collection of software,
usually malicious.
- They are the most difficult
to detect and remove, can
hide your presence.
- They dig deep into the computer and perform various illegal activities: stealing user information, sending unwanted email or engaging in DDOS attacks.
- They are used to capture information that is later sent to others for criminal exploitation.
- They track and record every keystroke on a computer, often without the user's permission or knowledge.
There are two main types of keyloggers: software and hardware.
Hardware keyloggers require actual physical access to a device.
Software keyloggers infiltrates the device via malicious links or attachments.
- "The secret entrance
to your devices".
Did you know that
your computer may
have hidden access?
- Consisting is a special sequence within the programming code, whereby you can bypass the security systems of the algorithm to access the system, the device and all its information, files and data saved in it.
- Independent program that replicates to infect.
- No need anyone´s action.
- Vulnerabilities
- Execute a paylot -> code:
- IP addresses that were sent to search for those who were not protected by antivirus software.
- Apeared in 2003 -> it infected more than 75,000 computers that were involved in DDoS attacks.
- It resurfaced in 2016 and 2017.
wA//orQuitA´23_