SIZ APPROVED COURSES|LECTURE 02|WAYS IN WHICH CYBER CRIMINAL CARRY OUT CRYBER CRIME|20% to siz-official

in Steem Infinity Zone3 years ago (edited)

INTRODUCTION

Hello steemians! Welcome to my blog once again. In this lecture, I would be explaining different methods and ways in which crybercriminals use to lunch attacks. This lecture post is very important as understanding the method in which crybercriminals use to lunch attacks would be the best way to protect our devices. It alighten is to know what we are up against. Read on

images (1).jpegsource

MAIN LECTURE

Crybercriminals uses different types of malicious programes to carry out their activities. This malicious programes or malware are written with code that can be usedo steal,cause harm or to manipulate a system and bypass acess controls. There are various types of malware programes in which crybercriminals use to lunch attacks. I will be explaining six malware programs used by crybercriminals.
  • SPYWARE:

    Spyware are programes designed to track and spy on your devices. Normally this programes are used by injecting devices such as flash drive into the target user device. They spyware capture all your sensitive information my modifying the security setting on your devices. When a crybercriminals want to attack using this programme, he or she might use a flash drive,connecting it to his targeted user devices. This programe starts running at the background of the device acting as a spy and transfering dicreate and personal information to the cryber criminal.

  • ADWARE:

    This programs are always installed with some version of software. The are normally seen on your devices as pop-up ads that delivers advertisment to a user. Most of this pop up ads are spy programe which install viruses and spyware on your devices, thereby reveling your discrete and secrete information.

  • ROOTKITS:

    This programes are designed to modify an operating system, creating a backdoor or a hole in which attackers can access computers. This programes are very dangerous programes, when a programe or a device is affected with this malware the ltograme need to be reinstalled or wiped.

  • VIRUS:

    This is a program that replicate and attaches itself to other files when it is been lunched. Vireus can be very harmful, it delet datas and also can act as a spy that transfer deceret information to a cryber criminal. Viruses are mostly spread by USD drives, optical disk, network share or even through our mails.

  • SCARE WARE:

    This malware uses scare tactics to trick or confuse you to make specific action. Normally this occurs as a warning telling you that your system is at risk and need to run a specific program for it to return to it normal operations. If you obey the instruction and exceutehe programe in which you were ask to run your system will become affected with this malware

  • BACK DOOR:

    This type of malware are use to gain unauthorized access into a system by passing normal authentication procedures. Therefore hackers can gain access into your system through the use of specific caring languages or with applications

The above malware programes are dangerous programes in which crybercriminals use to lunch attacks on their target. Some of the other example of malware are worm malware and Trogans horse. It is advisible to knows the ways and methods in which criminals use to lunch their attacks, so we can know what we are up against

In my next lecuture I would be treating Cyber security. Keep in touch for my next post.

Cc:
@siz-official
@cryptokraze

Sort:  
 3 years ago 

Thank you very much for sharing your quality content in detail on the SIZ Community. -We gave 40% support to this post from the siz official account. Congratulations ! Keep producing content in the SIZ Community . :)

You can delegate your SP to @siz-official and take benefit of our Delegation Rewards Offer of receiving up to 200% Curation Rewards

You can check our Steem Investment Plan and Receive 5% Profit Monthly

Thanks, I appreciate.