All About Identity and Access Management
An open forum to share views about Identity Management, Access Management and Access Governance.
Malware attacks
It is malicious software as unwanted software which is installed in your
systems without your concern. It can attach itself to legitimate code.
Types of attacks;
Virus: malware which can execute itself and spread by infecting other program or files.
Eg: STUXNET.Worm: it is exactly like a file without a host program and can spread without human interaction.
Eg: CODE RED, ILOVEYOU.Trojan: it can gain access to a system and also can execute malicious scripts and functions.
Eg: CRYPTO LOCKER, FLASHBACK.Spyware: it is unwanted software that infiltrates devices and steal the sensitive information which also can gain access to damage the system without user knowledge.
Eg: ADVANCE KEYLOGGER.Ransomware: it infects the users and can encrypt the data using the algorithm and can destroy the information also where it demands money from the victim so that it can be decrypted.
Eg: WANNACRY, SAMSAMRAT (Remote Access Trojan): it secretly creates a backdoor into an infected system that allows getting remotely access it without alerting the user and can controlling remotely and monitoring the device.
Eg: CYBERGATE
Mitigations for these attacks:
Avoid using Public Wi-Fi(coffee shops, malls)
Have a backup(use backup software to backup)
Set software settings to update automatically.
Have more security options.
Have strong passwords(Eg: @nu5h@123)
Block Pop-ups ads (ADblockers)
Always enable firewalls
Delete the emails from unknown sources and do not open the emails attachments from these unknown mails
Watch before you click anything.