Trojan Horse:
🔵A Trojan Horse is generally a non-self-replicating program containing
malicious code that, when executed, carries out actions, typically causing loss of data
🔵Malicious programs are classified as Trojans if they do not attempt to inject themselves into other files
Worm:
🔴A worm is a computer program that replicates itself in order to spread to other computers
🔴It uses a computer network to spread itself
🔴Unlike a computer virus, it does not need to attach itself to an existing
program
Spyware:
🔵Spyware is software that aids in gathering information about a person or organisation without their knowledge
🔵It may send such information to another entity without the consumer’s consent, asserts control over a computer without the consumer’s knowledge
🔵It detects key presses of the computer user
Adware:
🔴Adware is a form of spyware that collects information about the user in order
to display advertisements in the web browser
🔴Some applications that contain adware track the user’s internet surfing habits
in order to serve ads related to them
Rootkits:
🔵A rootkit is a type of software designed to hide the fact that an operating
system has been compromised ...
… sometimes by replacing vital executables
🔵Rootkits allow viruses and malware to ‘hide in plain sight’ by disguising as
necessary files that anti-virus software will overlook
🔵Rootkits themselves are not harmful – they are simply used to hide malware,
bots and worms
Malicious Bots:
🔴Malicious bots are self-propagating malware designed to infect a host and connect back to a central server or servers
🔴The servers act as a command and control (C&C) centre for an entire network
of compromised devices
🔴Hackers can launch flood-type attacks against their target(s)
🔴In addition to the worm-like ability to self-propagate, bots can act as spyware
Ransomeware:
🔵Ransomware is a type of malware which restricts access to the computer system that it infects
🔵It demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed
🔵Some forms of ransomware encrypt files on the system’s hard drive
🔵A Trojan Horse is generally a non-self-replicating program containing
malicious code that, when executed, carries out actions, typically causing loss of data
🔵Malicious programs are classified as Trojans if they do not attempt to inject themselves into other files
Worm:
🔴A worm is a computer program that replicates itself in order to spread to other computers
🔴It uses a computer network to spread itself
🔴Unlike a computer virus, it does not need to attach itself to an existing
program
Spyware:
🔵Spyware is software that aids in gathering information about a person or organisation without their knowledge
🔵It may send such information to another entity without the consumer’s consent, asserts control over a computer without the consumer’s knowledge
🔵It detects key presses of the computer user
Adware:
🔴Adware is a form of spyware that collects information about the user in order
to display advertisements in the web browser
🔴Some applications that contain adware track the user’s internet surfing habits
in order to serve ads related to them
Rootkits:
🔵A rootkit is a type of software designed to hide the fact that an operating
system has been compromised ...
… sometimes by replacing vital executables
🔵Rootkits allow viruses and malware to ‘hide in plain sight’ by disguising as
necessary files that anti-virus software will overlook
🔵Rootkits themselves are not harmful – they are simply used to hide malware,
bots and worms
Malicious Bots:
🔴Malicious bots are self-propagating malware designed to infect a host and connect back to a central server or servers
🔴The servers act as a command and control (C&C) centre for an entire network
of compromised devices
🔴Hackers can launch flood-type attacks against their target(s)
🔴In addition to the worm-like ability to self-propagate, bots can act as spyware
Ransomeware:
🔵Ransomware is a type of malware which restricts access to the computer system that it infects
🔵It demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed
🔵Some forms of ransomware encrypt files on the system’s hard drive
Comments
Post a Comment