Page 21 - CyberSecurityEssentialsEnglish
P. 21

Worms: Unlike viruses, they don't attack the host, being self-contained programs propagating across networks and
       computers. Worms are often installed through email attachments, sending a copy of themselves to every contact in
       the infected computer email list.
       Ransomware: This malware encrypts files and may deny access to the victim's data. The attacker threatens to publish
       or delete these data if he does not get the ransom requested.

       Spyware: This program is installed to collect information about users, their systems or browsing habits, sending the
       data to a remote user. The attacker can then use the information for blackmailing or downloading and installing other
       malicious programs from the web.
       Rootkit: This is a sophisticated malicious program designed to be hidden from the end user and the antivirus while
       opening a backdoor on the system. It allows the attacker to remotely control your computer and install other malicious
       software on it.





























                                                   Figure 11 Malware types

       Cyber Services
       We  need  cybersecurity  services  to  protect  our  systems  and  devices  from  threats  and  vulnerabilities.
       Governments established CERTs to carry out this mission and provide these services like (figure 12):

























          19
   16   17   18   19   20   21   22   23   24   25   26