Apa itu: perisian hasad

From Information Security Terms
Revision as of 04:50, 15 April 2020 by 8TG1K2 admin (talk | contribs) (Created page with "=== Perisian intip === Perisian intip adalah perisian yang tujuannya adalah untuk mencuri maklumat peribadi dari sistem komputer untuk pihak ketiga. Spy...")
Jump to navigation Jump to search
Other languages:
Bahasa Indonesia • ‎Bahasa Melayu • ‎Deutsch • ‎English • ‎Tiếng Việt • ‎Türkçe • ‎español • ‎français • ‎italiano • ‎português • ‎русский • ‎العربية • ‎فارسی • ‎हिन्दी • ‎中文 • ‎日本語 • ‎한국어

Apa itu perisian hasad

Perisian hasad - adalah nama umum untuk beberapa jenis perisian, yang dirancang untuk mendapatkan akses tanpa izin ke peranti pengkomputeran (komputer, telefon pintar, dll.) Atau rangkaian dan/atau dengan sengaja merosakkan pengguna peranti ini. Oleh itu, perisian didefinisikan sebagai perisian hasad, bergantung pada tujuan penggunaannya, dan bukan pada metodologi atau teknologi tertentu yang didasarkan pada perisian ini.

Tujuan penggunaan

Program malware pertama dibuat sebagai eksperimen atau untuk bersenang-senang. Hari ini, perisian berniat jahat paling sering digunakan untuk mencuri maklumat - berkaitan kewangan, peribadi, atau perniagaan. Perisian berbahaya boleh digunakan untuk serangan terhadap organisasi (penembusan ke dalam rangkaian tempatan) dan bahkan di negara, serta untuk mencuri maklumat tertentu mengenai seseorang (pencurian data bank, perincian akses ke pelbagai perkhidmatan, dll.).

Sebilangan besar virus dan cacing yang ada sekarang dirancang untuk mendapatkan kawalan terhadap peranti yang diserang (komputer, telefon pintar, dll.). Selepas ini, peranti yang dipantau dapat digunakan untuk mengirim spam, menyimpan maklumat haram (mis. Pornografi kanak-kanak) atau untuk melakukan serangan jenis lain.

Pengelasan perisian hasad

Beberapa produk perisian hasad boleh dimiliki oleh beberapa jenis pada masa yang sama; program seperti itu sering mempunyai ciri-ciri Trojan dan cacing, dan kadang-kadang virus juga. Biasanya, program berniat jahat disampaikan kepada pengguna akhir sebagai kuda Trojan, tetapi setelah dilancarkan, perisian itu diperbaiki pada peranti pengguna dan menjangkiti fail program lain yang boleh dilaksanakan, iaitu bertindak seperti virus; ia juga boleh menyerang peranti lain melalui rangkaian, iaitu bertindak seperti worm.

Virus

Virus komputer adalah program yang tersembunyi dalam perisian lain, biasanya berguna atau tidak berbahaya. Virus dapat membuat salinannya sendiri dan memasukkannya ke dalam fail program lain yang boleh dilaksanakan. Virus biasanya melakukan beberapa tindakan jahat - contohnya, pencurian atau pemusnahan data.

Cacing komputer

Cacing komputer (rangkaian) adalah perisian yang menyalin dirinya sendiri ke komputer lain melalui rangkaian komputer untuk menyebarkannya sendiri. Biasanya, jurang dalam sistem operasi atau tetapan rangkaian digunakan untuk ini.

Perisian intip

Perisian intip adalah perisian yang tujuannya adalah untuk mencuri maklumat peribadi dari sistem komputer untuk pihak ketiga. Spyware mengumpulkan maklumat dan mengirimkannya kepada penyerang.

Trojan horses

A Trojan horse (or simply 'a Trojan') is a malicious program that disguises itself as a regular useful program or an app to convince the victim to install it. A Trojan horse usually carries a hidden destructive function activated when the Trojan-laden application starts. The term is derived from an ancient Greek story about a Trojan horse used to covertly invade the city of Troy. Unlike computer viruses and worms, Trojan horses usually do not try to embed themselves in other files or otherwise spread themselves.

Logic bombs

A logical bomb is a malicious program that uses a trigger for activating malicious code. A logic bomb does not work until this trigger event occurs. Once launched, a logic bomb injects malicious code that harms the computer. Cybersecurity experts recently discovered logic bombs that attack and destroy equipment components on workstations or servers, including cooling fans, hard drives, and power supplies. The logic bomb overloads these devices until they overheat or fail.

Ransomware

A screen blocker is a pseudo-police program that locks the screen on the device and informs the user that he or she is ostensibly accused of collecting illegal content, trying to scare the victim and make him or her pay the "fine".

Rootkits

A rootkit is a malicious program that hides its presence with the help of a low-level modification of the infected system. Rootkits can prevent the appearance of their executable process in the list of system processes or block reading of their files.

Backdoors

A backdoor is a malicious program that provides access to the infected device by means of bypassing normal authentication procedures, usually through a network connection. After a system (computer or subnet) is hacked, a backdoor can be installed to provide access to the hacked system in the future, invisibly to its user.

Adware

Adware is a type of malware that redirects your browser to an advertising web page without your consent. Often these pages try to download other malware. As cyber security experts say, adware is often found in so-called free programs, such as games or browser extensions.

Cryptojacking

Cryptojacking is malware that uses power of your device (e.g. computer) to mine cryptocurrencies without your knowledge. Such mining software may run in the background on your operating system or even like JavaScript in a browser window.

Malvertising (Malicious Advertising)

Malicious advertising is using legitimate advertisements or ad networks to deliver malware. For example, a cybercriminal may pay for placing an advertisement on some website. When a user clicks on this ad, the code in the ad either redirects the user to a malicious website or installs malware on the victim's computer. In some cases, malware embedded in such ads can run automatically without any user’s action - this method is called "boot from disk".

Methods of Infection

Security Gaps in Software

Malicious software may use security flaws (vulnerabilities) in the operating system, individual applications, or application extensions (plug-ins). A common method of infection is to exploit the buffer overflow vulnerability.

Overly privileged users and overly privileged code

In computer systems, different users and programs have different privileges as to how they can influence the system. In poorly designed systems, users and programs can be given too high privileges without explicit need for it, and malicious software can take advantage of this.

Insecure system settings or user errors

Insecure settings include, for example, ability to autoload from removable media (USB, CD, DVD, etc.). User errors are actions of the device user, which lead to infection. Most often, these actions include launching programs of dubious or obviously dangerous origin (cracks and keygens for paid software, opening email attachments, etc.) without checking them first.