Page 35 - TP_iPlus_V2.1_Class7
P. 35
i + MALWARE
Malware is a broad term for various types of malicious software designed to damage, disrupt,
or gain unauthorized access to a computer system. It can also perform other unwanted actions,
such as stealing data or spying on users. In Spanish, 'mal' is a prefix that means 'bad,' making the
term 'badware,' which is a good way to remember it.
There are several types of malware programs, each with distinct characteristics and methods of
attack. Some of them are the worm, trojan horse, spyware, ransomware, rootkit and backdoor.
Let us discuss these in detail.
Worms
Worms are computer programs or algorithms that are foreign to the host computer and are
designed to deliberately slow down the functioning of a computer. Worms replicate inside the
system and thus they can also occupy significant amounts of memory and storage space, which
can slow down or disrupt the normal functioning of a computer. Worms spread more commonly
on computers that are connected on network.
Trojan Horse
Trojan horse is a dangerous virus. It represents itself as helpful software program. Once the user
clicks to run it, it gains access to sensitive data and then modifies, blocks, or deletes the data. It
cannot copy itself from one computer to another.
Spyware
Spywares programs infect computers and collect information without the owner’s knowledge or
consent. A spyware generally infects a computer system by getting transmitted through internet,
websites, webpages, e-mails or through network of computers. It intrudes into a computer and
quietly steals the data of the computer. In other words, it refers to a type of software designed
to monitor the activities of a computer system and report to the users. An example of spyware is
a keylogger, which records keystrokes to capture sensitive information.
To prevent the attacks of spyware:
• Use anti-spyware (software).
• Avoid exploring error dialogs on Internet.
• Avoid using free deal offers on Internet.
• Ensure the authenticity of a program before installing it on your computer
• Keep your operating system and software up to date.
• Be cautious with email attachments and links.
Info Byte
The term ‘trojan’ is derived from the Trojan Horse story in Greek mythology, which
explains how the Greeks were able to enter the fortified city of Troy by hiding their
soldiers in a big wooden horse given to the Trojans as a gift. The Trojans were very fond
of horses and trusted the gifts blindly. At night, the soldiers emerged and attacked the
city from inside.
33
Computer Virus

