29.07.2016 Views

Cyber Primer

AEWhbF

AEWhbF

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Cyber</strong> threats<br />

2.21. Social media. Significant data can be gathered and analysed from<br />

links made from social media applications. Technical collection of computer<br />

traffic patterns by third parties using commercially available software can<br />

provide information on location, strengths, movements of individuals and<br />

units, as well as morale and intentions.<br />

2.22. Malware. Malicious software, known as malware, is an overarching<br />

term for software that is designed to infiltrate or damage a computer.<br />

Malware’s effects can include:<br />

• denial of service (DoS) intended to overload a system;<br />

• recruiting the target system as part of a botnet (also known as<br />

becoming a zombie) which can result in launching a distributed<br />

denial of service (DDoS) on everyone/everything you’re connected<br />

to (for example, connecting to others using your address book);<br />

• privilege escalation, where access is gained to a system and<br />

escalated to include the addition of admin/root privileges;<br />

• keystroke logging – this uses a virus or physical device that logs a<br />

user’s keystrokes as they type, compromising data, passwords and<br />

credit card numbers;<br />

• geo-location of smartphones, tablets, laptops and similar devices;<br />

and<br />

• exploiting social networks.<br />

2.23. Malware types. Malware has traditionally been designed to infect<br />

computers and computer networks. However, the rapidly increasing<br />

popularity of smartphones, tablets and other Internet-enabled technology<br />

provides new and appealing targets for malware developers. Some malware<br />

combines attributes into so-called ‘blended threats’ that are becoming<br />

difficult to detect and remove. Some of the types of malware available are<br />

described on page 33.<br />

32<br />

<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!