2. T a b l e o f
C o n t e n t s
Malware
Internet Scams
Cyberbullying
System Defense
2.
3.
4.
1.
3. WHAT IS
MALWARE?
MALWARE - ( "malicious software") is a
computer program that is created with
the intention of causing damage,
infecting the system or gaining
unauthorized access to the target
device or data.
VIRUS - A self-replicating program,
when launched, can infect existing files
and spreads by launching them. They
can cause data corruption, slow down
the system, or even prevent it from
working properly.
KEYLOGGER - Malicious software that
secretly records and tracks keystrokes
on a computer keyboard. Its purpose is
to obtain sensitive information such as
passwords, bank details or other
confidential information. Logged data
are transferred to the attacker.
BACKDOOR - is a technique that
malware can use to gain unauthorized
access to a system or to allow remote
control of an infected device without the
user's knowledge.
TROJAN HORSE - disguises itself as a
legitimate program but actually
contains hidden malicious functionality
4. CRYPTOJACKING
Cryptojacking is a technique
of exploiting a computer's
computing power to mine
cryptocurrencies without the
user's knowledge or consent.
Cryptominer malware infects
a device and uses its
computing resources to mine
cryptocurrencies, which can
lead to system slowdowns,
power drains, and increased
hardware wear and tear.
Cryptomining malware is
often spread through
infected websites, spam
emails, or illegal software.
5. INTERNET SCAMS
Nigerian Prince - is very well known
scam. The attackers send emails
impersonating a wealthy Nigerian prince
or other important person, promising a
large financial reward in exchange for
help transferring money abroad. The
victim is then asked to pay fees, bribes or
processing costs, but no money is ever
received. Attackers take advantage of
victims' greed and gullibility.
Malvertising - is a fraudulent method
where malicious code is hidden in online
advertisements. Attackers inject
malicious code into ad networks or
websites, allowing the devices of visitors
to those sites to be infected.
When a user clicks on an infected ad,
they may be redirected to pages
containing malware that can steal
sensitive information, install additional
malware, or cause other damage to the
device.
Deepfake - is an artificial intelligence
technique that creates fake videos or
images that look real. It is used to
combine and manipulate existing
content so that it is possible to replace
people's faces in videos, create fake
conversations or even create fake events.
Deepfake has the potential to be
misused to spread misinformation,
attack reputations, and manipulate
public opinion.
6. PHISHING:
A form of cyber attack in
which attackers attempt to
obtain sensitive
information from users by
impersonating a trusted
entity such as a bank,
company, or government
organization.
Attackers typically use
fake emails, websites or
messages that look
authentic and ask users to
provide their logins,
passwords, payment
details or other sensitive
information.
7. CYBERBULLYING
Cyberbullying is a form of harassment,
intimidation or abuse of people through
online means such as social media,
computer games or messages. It can
include posting hate messages, creating
fake profiles, hate blogs and websites,
sharing sensitive or degrading content
or verbal abuse online.
The EU Kids Online 2020 project
states that a total of 15 percent of
Czech children aged 9-17 who use
the Internet were victims of online
aggression.
Cyberbullying can have serious
consequences for victims, including
psychological harm, reduced self-
confidence and can even lead to suicide.
Cyberstalking - a form of harassment
and stalking of an individual online by
constantly monitoring their activity,
gathering information and using digital
means to scare and intimidate. Attackers
can use social media, email messages, or
other communication channels to
invade their victim's privacy.
While blocking a person on social media
can provide some level of protection, it is
not a guaranteed way to completely get
rid of cyberstalking harassment.
Attackers may use other accounts or
means of communication to continue
harassing the victim. Additionally,
blocking may not stop an attacker from
monitoring public posts or collecting
information about the victim from
others. Therefore, it is important to
inform the administrators of the given
network about the problem or, if
necessary, contact the legal authorities.
8. CYBERGROOMING
Is a process in which the
perpetrator uses the
Internet to build false
trust in a stranger with
the aim of sexual or
economic abuse.
Attackers often pose as
young people and use
various online platforms,
social media or chat
applications to make
contact with potential
victims.
According to the
cybergrooming.cz portal,
the latency of this
phenomenon is so high
that only 10% of victims
report this behavior.
9. ANTIVIRUS
SOFTWARE
Antiviruses detect malicious programs
using a method that relies on a database
of known malicious codes, so-called virus
definitions or signatures. The antivirus
checks the files and looks for malicious
code signatures stored in the
aforementioned virus database. Since
new threats are constantly emerging, it
is important to update the database
regularly.
In some cases, it can happen that even
common software can be falsely
identified as a virus, in which case it is a
"false positive".
If a threat is detected, antivirus software
takes actions such as quarantining or
deleting infected files, and provides
users with alerts and protection against
other threats.
Before running any software,
the software is first quickly
scanned in the background
by an anti-virus program.
However, cyber security as
such is not a product and is
not the same as owning an
antivirus. The best way to
avoid cyber threats is with
good cyber habits and a high
level of awareness.
10. POLYMORPHIC
MALICIOUS CODES
In order for the virus to escape
detection due to signatures,
new, more complex viruses use
encryption, during which they
can change their form several
times.
Therefore, the antivirus program
has to apply other methods to
detect the virus, some of which
remain largely unrecognized.
Therefore, in order for the
antivirus to properly analyze and
decrypt the files, sufficient
computing power is required
and becomes more demanding.
It is estimated that up
to 90% of malicious
codes are polymorphic.