Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
a. Password Stealer
A password stealer is a program that collects chunks of data that are
likely to be account names and their associated passwords so that
an attacker can use those credentials to pose as the person they
were stolen from.
C. TROJAN HORSE
b. Keylogger
A keylogger is a technology that tracks and records consecutive
key strokes on a keyboard. Because sensitive information such as
usernames and passwords are often entered on a keyboard, a keylogger
can be a very dangerous technology. Keyloggers are often part of
malware, spyware or an external virus.
c. Fake Program
When installed the fake program, this program mimics a scan of
your computer and then report several flase detected spyware or
viruses on the computer.
C. TROJAN HORSE
d. Anonymous Emailer
An anonymous remailer is a server that receives messages with
embedded instructions on where to send them next, and that forwards
them without revealing where they originally came from
e. Remote Monitoring
Remote monitoring is a technique for monitoring network
conditions, monitoring is related to data traffic in a LAN network
C. TROJAN HORSE
f. Remote Administrator
Remote Administrator is a software dor viewing and controling
other computers from your computer through a local network (LAN)
D. SPYWARE
Spyware, as its name suggests, is designed to spy on what a user is
doing. Hiding in the background on a computer, this type of malware
will collect information without the user knowing, such as credit card
details, passwords and other sensitive information.
D. RANSOMWARE
Also known as scareware, ransomware comes with a heavy price. Able
to lockdown networks and lock out users until a ransom is paid,
ransomware has targeted some of the biggest organizations in the
world today — with expensive results.
Exercise 5
1. A software which is created to do something bad and tp perfom criminal intension:
a. Microsoft Software c. Malicious Software e. Pirate Software
b. Virus Software d. Linux Software
2. A software that can replicate by injecting or infecting its own code into other file :
a. Virus c.Worm e. Cookies
b. File d. Macro
3. A software which replicates by creating its own copy :
a. Virus c.Worm e. Cookies
b. File d. Macro
4. Example of Worm :
a. Fall.txt c.Worm.txt e. Cookies.txt
b. File.txt d. I Love You.txt
5. There are kind of malicious software but not inject files :
a. Virus c. Tracker e. Worm
b. Trojan d. Ghost