A computer virus is malicious code written to interfere with computer operations and cause damage to data and software. The virus attaches itself to programs or documents on a computer, then spreads and infects one or more computers in a network.
Today, viruses are more commonly referred to as malware, which is software designed to harm devices or networks
influential computer attack
In 1986, the Alvi brothers created the Brain virus, although the intention of the virus was to track illegal copies of medical software and prevent pirated licenses,
在1988年,羅伯特·莫里斯(Robert Morris) 開發了一個程式,用以評估互聯網的規模。這個程式會爬行網頁,不斷地訪問和記錄其他計算機的信息。並自動安裝到其他計算機上,以統計與互聯網連接的計算機數量。這裡的自我安裝特性,描述了一種無需用戶干預的傳播方式,突顯了其潛在的危險性。此事件強調了資訊安全的重要性,導致後來的計算機緊急響應小組(CERTs®)的成立,以應對未來可能發生的安全事件。Computer Emergency Response Teams, known as CERTs®
Attacks in the digital age:LoveLetter attack and the Equifax breach
LoveLetter
由來:
LoveLetter病毒: 於2000年爆發,這是一種通過電子郵件傳播的惡意軟體,旨在竊取網絡登錄憑證。the LoveLetter malware to steal internet login credentials.
社交工程: 這是一種操縱技術,攻擊者利用人們的信任和錯誤來獲取敏感信息。Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. 原因:
病毒 (Viruses):病毒是一種惡意程式碼,設計用來干擾計算機操作並損害數據和軟體。病毒的特點是必須由使用者啟動,即由一個威脅行為者透過惡意的附件或檔案下載來傳播。當有人打開這些惡意附件或下載時,病毒會潛藏在當前系統內的其他檔案中。當這些被感染的檔案被打開時,病毒便會插入自己的程式碼,以損害或摧毀系統中的數據。A malware program that modifies other computer programs by inserting its own code to damage and/or destroy data
蠕蟲 (Worms):蠕蟲是一種惡意軟體,能夠自行複製並在系統間擴散。與病毒不同,蠕蟲不需要用戶下載,它可以從已經被感染的計算機自我複製並傳播到同一網絡上的其他設備。這使得蠕蟲能夠更快速地擴散,對網絡安全造成更大的潛在威脅。Malware that self-replicates, spreading across the network and infecting computers
勒索病毒 (Ransomware):勒索病毒是一種惡意攻擊,威脅行為者加密一個組織的數據,並要求支付贖金以恢復訪問權限。這種攻擊對於企業和個人來說非常危險,因為如果不支付贖金,通常會導致重要數據的永久丟失。A malicious attack during which threat actors encrypt an organization's data and demand payment to restore access
間諜軟體 (Spyware):間諜軟體是一種用於在未經同意的情況下收集和出售信息的惡意軟體。它可以用來訪問設備,這使得威脅行為者能夠收集個人數據,例如私人電子郵件、簡訊、音視頻錄製和位置信息。這類攻擊的隱蔽性使得它們更具威脅性,因為用戶往往不知自己已經被監控。Malicious software installed on a user’s computer without their permission, which is used to spy on and steal user data