Term Malware is short for malicious software. It performs action without user knowledge or consent.
The Computer Fraud and Abuse Act
This law addresses federal computer-related offences
The Patriot Act
Expansion on powers included in The Computer Fraud and Abuse Act
Categories of Malware
Replicates and attaches itself to other files on the system. In most cases require some sort of user interaction
Can replicate on there own very quickly. Responsible for some of devastating DOS attacks in the past
Like virus requires in most cases some sort of user interaction. Based on social engineering for the large part.
Can hide within core components of the system. Can be undetected by many scanners.
Gathers user and computer activity while being in stealth mode. Keyloggers are good example.
Design to advertise product on infected system. May replace home page or place pop-up’s on infected computers.
- System or boot sector virus
- Macro virus
- Cluster virus
- Logic bomb
- Companion or camouflage virus
- Cavity or file-overwriting virus
- Encryption virus
- Stealth virus
- Do not require a host application to perform their activities
- Do not require user interaction
- Replicate very rapidly
- Consume bandwidth and resources
Methods of Spyware Infection
- Peer-to-Peer Networks
- Instant Messaging
- Internet Relay Chat
- Email Attachment
- Physical Access
- Browser Defects
- Software Installations