2004 Lecture Notes - Lecture 3: Rootkit, Privilege Escalation, Ransomware

31 views3 pages
29 Nov 2021
Department
Course
Professor

Document Summary

Any code that can be used to steal data, bypass access controls, or cause harm to, or compromise a system. Design to track and spy on the user. Often includes activity trackers, keystroke collection, and data capture. Often bundles itself with legitimate software or with trojan horses. Advertising supported software is designed to automatically deliver advertisements. Often installed with some versions of software. Designed to only deliver advertisements but it is also common for adware to come with spyware. Designed to automatically perform action, usually online. Most bots are harmless, one increasing use of malicious bots are botnets. Infected with bots which are programmed to quietly wait for commands provided by the attacker. Designed to hold a computer system or the data it contains captive until a payment is made. Other versions of ransomware can take advantage of specific system vulnerabilities to lock down the system. Spread by a downloaded file or some software vulnerability.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents