100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Class notes

An introduction to malware

Rating
-
Sold
-
Pages
9
Uploaded on
27-09-2025
Written in
2024/2025

Are you studying computer science or cybersecurity and looking for a complete, well-structured, and easy-to-follow resource? These in-depth notes cover three essential topics: Introduction to Computer Security and malware Packed with detailed explanations, real-world examples, and integrated quizzes with correct answers, this guide is everything you need to solidify your understanding and prepare for your exams. What's Inside? Topic 1: Introduction to Computer Security and Malware - This section lays the groundwork for your entire security education, starting with core principles and moving into the fascinating world of malware. Security Fundamentals: - Learn the formal definition of computer security and asset protection. - Master the cornerstone of information security: the CIA Triad (Confidentiality, Integrity, and Availability), with detailed explanations of concepts like access controls, encryption, digital signatures, and data backups. - Understand the primary goals of security: Prevention, Detection, and Reaction. - Grasp key security aspects including Policy, Threat Models, and Mechanisms. Hackers and Threats: - Define critical terms like Attack, Risk, Exploit, and Zero-day vulnerabilities. - Differentiate between hacker types: White Hats (ethical hackers), Black Hats, and Grey Hats. - Understand social engineering through attacks like Phishing. Malware Deep Dive: - Explore various types of malicious software, including Viruses, Worms, Adware, Trojans, and Spyware. Features real-world examples like Stuxnet, Zeus, and the "I love you" virus. - Discover common attack methods such as Keyloggers, Ransomware (e.g., WannaCry), Botnets, and Rootkits. Malware Analysis: - Learn the two primary analysis techniques: - Static Analysis (examining files without running them) and Dynamic Analysis (observing malware in a controlled sandbox environment). - Understand methods like antivirus scanning, hashing (MD5 and SHA1), and the use of sandboxes to uncover malware functionality. Includes 5 quizzes with answers to test your knowledge on the basics, malware types, botnets, and analysis techniques.

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Unknown
Course

Document information

Uploaded on
September 27, 2025
Number of pages
9
Written in
2024/2025
Type
Class notes
Professor(s)
Matthew yeeking
Contains
Topic 1-3, malware to network and os security

Subjects

Content preview

Defining computer security
- Security: asset protection, protection against danger loss or loss of control of something
valuable
- Computer Security: protection of computer related assets against an attack or threat &
ensure usage of computer hardware and software by non attackers
- CIA (Confidentiality, Integrity, Availability):
- Confidentiality: Ensures that information is accessible only to those authorized to
view it
- Access controls: Limiting access to data through authentication methods
like usernames, biometrics and multi-factor authentication
- Encryption: converting data into a coded format to make it unreadable
without the property
- Data Masking and Obfuscation: redacting sensitive parts of data when
shown to unauthorized individuals or applications
- Network security: Implementing firewalls, VPNs and secure network
configurations to prevent unauthorized access
- Integrity: Protects information from being altered or tampered with
- Checksums and Hashing
- Digital signatures and certificates
- Access controls and permissions
- Audit Trails and Logging
- Availability: Ensures that authorized users have consistent access to information
- Redundancy and Fault Tolerance
- Data Backups
- Disaster Recovery and Continuity Plans
- Network Security and Defense

Goals:
1. Prevention: safeguarding of assets from threats
2. Detection: system to detect when attack or malicious activity about to take place
3. Reaction: defining procedures that enable you to deal with an attack

Security aspects:
1. Policy: deals with confidentiality, integrity, and availability of data
2. Threat model: set of assumptions about people involved in malicious activity and the
3. Mechanism: software/ hardware that's designed and implemented to make sure the
policies enforced using assumptions which we made using the threat model

Important terms:
- Attack: activities harmful to computer systems, data, software and hardware etc
- Risk: possibility of damage or loss of digital assets in case of an attack

, - Zero-day from ability: A vulnerability used by an attacker before being discovered by the
developer of the software
- Zero-day: length of time the developer has to react to this particular issue (none
at all)
- Exploit: software used to take advantage of a bug/ vulnerability
- Hackers
- White hats (ethical hackers): try to find weaknesses in the computer or network
system with proper permission from a company
- Aim: find and fix the vulnerabilities before they are exploited by an
attacker
- Black hats: try to penetrate the system to gain unauthorized access
- Aim: harm operations/ steal sensitive information
- Gray hats: falls between white hat and black hats and work with varying
combinations or both good and bad intentions
- Phishing: A social engineering attack where attackers pose as legitimate entities




Quiz: The basics
$7.56
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
milanamhy25

Also available in package deal

Get to know the seller

Seller avatar
milanamhy25 Goldsmiths, University of London
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
10 months
Number of followers
0
Documents
6
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions