Cyber Primer
AEWhbF
AEWhbF
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Cyber</strong> threats<br />
2.21. Social media. Significant data can be gathered and analysed from<br />
links made from social media applications. Technical collection of computer<br />
traffic patterns by third parties using commercially available software can<br />
provide information on location, strengths, movements of individuals and<br />
units, as well as morale and intentions.<br />
2.22. Malware. Malicious software, known as malware, is an overarching<br />
term for software that is designed to infiltrate or damage a computer.<br />
Malware’s effects can include:<br />
• denial of service (DoS) intended to overload a system;<br />
• recruiting the target system as part of a botnet (also known as<br />
becoming a zombie) which can result in launching a distributed<br />
denial of service (DDoS) on everyone/everything you’re connected<br />
to (for example, connecting to others using your address book);<br />
• privilege escalation, where access is gained to a system and<br />
escalated to include the addition of admin/root privileges;<br />
• keystroke logging – this uses a virus or physical device that logs a<br />
user’s keystrokes as they type, compromising data, passwords and<br />
credit card numbers;<br />
• geo-location of smartphones, tablets, laptops and similar devices;<br />
and<br />
• exploiting social networks.<br />
2.23. Malware types. Malware has traditionally been designed to infect<br />
computers and computer networks. However, the rapidly increasing<br />
popularity of smartphones, tablets and other Internet-enabled technology<br />
provides new and appealing targets for malware developers. Some malware<br />
combines attributes into so-called ‘blended threats’ that are becoming<br />
difficult to detect and remove. Some of the types of malware available are<br />
described on page 33.<br />
32<br />
<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)