Virus
--> The virus is a piece of software designed to infect the computer system.
--> Almost all viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program.
--> Viruses spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments.
--> Viruses can be attached to any .EXE,.DOC,.XOM,.XLL
--> Spread quite slow as it requires user interaction to replicate into other computers.
WORM
--> A worm is a computer program that uses computer network and security holes to replicate itself.
--> Worm does not require any user interaction to replicate to other computers.
--> A worm simply scans for other computers in the network for the same security holes and replicates itself into it without user interaction.
--> It harms network users and consumes bandwidth.
--> Spreads rapidly compared to Virus as does not require any user interaction to replicate.
TROJAN HORSE
--> A Trojan is a program that presents themselves as something useful and yet contains malicious data in it.
--> Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
--> Trojans must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the Internet.
--> When the user executes a Trojan horse, the program performs the expected task for ex. a calculator or a mp3 music converter etc, however, the program is also performing actions unknown to the user.
SPYWARE
--> Spyware is a type of malicious software installed on computers that collects information about users without their knowledge.
--> The presence of spyware is hidden from the user and can be difficult to detect. Keyloggers are a type of spyware.
ADWARE
--> Adware (advertising-supported software) is a computer software which shows advertisements. These advertisements can be in the form of a pop-up, embedded in the user interface of the main software or on a screen presented to the user during the installation process.
--> Adware is harmless but some adware may come with integrated spyware software such as keyloggers.
Exploit
--> An exploit is a piece of software, a command, or a methodology that attacks a particular security vulnerability.
--> Exploits are not always malicious in intent—they are sometimes used only as a way of demonstrating that a vulnerability exists. However, they are a common component of malware.
Backdoor
--> A back door is an undocumented way of accessing a system, bypassing the normal authentication mechanisms.
--> Some backdoors are placed in the software by the original programmer and others are placed on systems through a system compromise, such as a virus or worm.
--> Usually, attackers use backdoors for easier and continued access to a system after it has been compromised.
Ransomware
--> Ransomware is a type of malware program that infects, encrypts or takes control of the system and demands Ransom ( Money) to remove it.
--> Ransomware attacks a computer with the intention of gaining money from its owner.
--> Ransomware sometimes also be called as a crypto-virus, crypto-Trojan or crypto-worm.
0 comments:
Post a Comment