InterviewSolution
| 1. |
What Are The Damages Of Malware? |
|
Answer» Damages of Malware Data LOSS : Many viruses and Trojans will attempt to delete files or wipe hard drives when activated, but even if you catch the infection early, you may have to delete infected files. Account Theft : Many TYPES of malware include keylogger functions, designed to steal accounts and passwords from their targets. This can give the malware author access to any of the user's online accounts, including email servers from which the hacker can launch new attacks. Botnets : Many types of malware also subvert CONTROL over the user's computer, turning it into a "bot" or "zombie." Hackers build networks of these commandeered computers, using their combined processing power for tasks like cracking password files or sending out bulk emails. Financial Losses : If a hacker GAINS access to a CREDIT card or bank account via a keylogger, he can then use that information to run up charges or drain the account. Given the popularity of online banking and bill payment services, a hacker who manages to secrete a keylogger on a user's system for a full month may gain access to the user's entire financial portfolio, allowing him to do as much damage as possible in a single attack. Damages of Malware Data Loss : Many viruses and Trojans will attempt to delete files or wipe hard drives when activated, but even if you catch the infection early, you may have to delete infected files. Account Theft : Many types of malware include keylogger functions, designed to steal accounts and passwords from their targets. This can give the malware author access to any of the user's online accounts, including email servers from which the hacker can launch new attacks. Botnets : Many types of malware also subvert control over the user's computer, turning it into a "bot" or "zombie." Hackers build networks of these commandeered computers, using their combined processing power for tasks like cracking password files or sending out bulk emails. Financial Losses : If a hacker gains access to a credit card or bank account via a keylogger, he can then use that information to run up charges or drain the account. Given the popularity of online banking and bill payment services, a hacker who manages to secrete a keylogger on a user's system for a full month may gain access to the user's entire financial portfolio, allowing him to do as much damage as possible in a single attack. |
|