CRIMES ON PROPERTY
Cyber Crimes are done to cause damage computer systems and related machines. The main way these culprits strike, is by developing a program code that may tamper with critical programs and files currently installed on the user's system. If certain files and/or programs are corrupted/deleted, it may cause the computer to behave erratically and even make it unable to boot properly.
These evil programs are referred to as MALWARE (MALicious softWARE). Malware comes in many forms including Trojans, Viruses, Denial-of-Service (DoS) attacks and Rootkits.
These evil programs are referred to as MALWARE (MALicious softWARE). Malware comes in many forms including Trojans, Viruses, Denial-of-Service (DoS) attacks and Rootkits.
VIRUS
Any program that create copies of itself on other programs, files of the target computer. This type of program may disrupt computer processing by wasting space on the hard disk and the Central Processing Unit (CPU), corrupt critical system files among others.
TROJAN HORSE
Sometimes a program may pretend to be a legitimate software program but intends on damaging other files and data on the infected computer. These “fake” programs are referred to as Trojan horses, or just simply Trojans. Unlike viruses, Trojans are not able to replicate itself. However, it may allow unrestricted passage for viruses to infect the system or to an external user to take control of the infected computer.
A common trojan horse program is the Beast control program. Beast is a Windows-based backdoor Trojan horse that is invisible to the infected computer and it gives full control of that computer.
A common trojan horse program is the Beast control program. Beast is a Windows-based backdoor Trojan horse that is invisible to the infected computer and it gives full control of that computer.
ROOTKIT
A rootkit is a type of software designed to hide certain processes, programs and files from normal detection and enable continuous privileged access to a computer. This type of malware is very difficult to detect because it is usually loaded before the operating system has completely booted. Due to its sophisticated composition of coding, specific anti-malware programs that has the function to detect and eradicate rootkits (anti-rootkits) are needed for adequate security.
DENIAL-OF-SERVICE (DOS)
Denial-of-Service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users. This is usually done by overloading the traffic within the network, which may temporarily or indefinitely interrupt or suspend services of the host computer connected to the Internet. This is not always done by one user or system, as there is Distributed Denial-of-Service (DDoS) that involves more than one system inflicting the damage.