Types of Malware

 Types of Malware - Test Yourself 

 

Adware 

Adware is advertising-supported software. This is any software package which automatically shows adverts, such as pop-ups. It may be used in the user interface of a software package or on an installation screen. Adware is mostly harmless, whereas in some circumstances, some adware may include spyware such as key-loggers.  

 

Key-Logger 

Key loggers can be installed in two different forms. They can be legitimately installed to monitor users or can be installed maliciously. Key-loggers collect information and send it back to a third party. Some key-loggers only collect keyboard strokes into one website or application. Others record every keyboard stroke including any information/data that is cut and pasted.  

 

(RAT0 Remote access Trojan/Trojan  

RAT’s access and infect digital systems. RAT’s are typically installed without user consent and remain hidden to avoid detection. This allows a hacker to control your device remotely. RAT’s are typically downloaded on a what seems to be like legitimate program, like a game. As a trojan is any malware that misleads users of it’s true intent by disguising it’s self as a standard program, the Greek story of a wooden horse being snuck into the town of troy unnoticed.  

 

Ransomware 

Ransomware is a virus that holds a digital system captive and demands a ransom, usually money, to release it. Ransomware can restrict user access to a computer system by either encrypting files or locking down the computer system. A message is usually displayed to force the user to pay the ransom. It is spread like a worm and can be started by downloading an infected file or vulnerability on the computer system. 

 

Spyware 

Spyware can collect data from an infected digital system, including personal information like websites visited, user logins and financial information. Spyware is usually hidden from a user and is harder to detect. It is usually secretly installed on a user's computer without their knowledge. Some examples of spyware include; Key-loggers, info stealers and rootkits.  

 

Virus  

A virus attempts to make a digital system vulnerable. Viruses’ work by having a computer program that replicates itself and spreads from computer to computer. Viruses increase their chances of spreading to other computers by infecting files on a network file system or a file system accessed by other computers. Examples of viruses include: Trojan horses and a browser hijacker.  

 

Worm 

Comments

Popular posts from this blog

Topologies

Core A – Formative Assessment

Emerging technologies allowing adaptability and future proofing