Page 35 - TP_iPlus_V2.1_Class7
P. 35

i +  MALWARE

                 Malware is a broad term for various types of malicious software designed to damage, disrupt,
                 or gain unauthorized access to a computer system. It can also perform other unwanted actions,
                 such as stealing data or spying on users. In Spanish, 'mal' is a prefix that means 'bad,' making the
                 term 'badware,' which is a good way to remember it.

                 There are several types of malware programs, each with distinct characteristics and methods of
                 attack. Some of them are the worm, trojan horse, spyware, ransomware, rootkit and backdoor.
                 Let us discuss these in detail.

                 Worms

                 Worms are computer programs or algorithms that are foreign to the host computer and are
                 designed to deliberately slow down the functioning of a computer. Worms replicate inside the
                 system and thus they can also occupy significant amounts of memory and storage space, which
                 can slow down or disrupt the normal functioning of a computer. Worms spread more commonly
                 on computers that are connected on network.

                 Trojan Horse

                 Trojan horse is a dangerous virus. It represents itself as helpful software program. Once the user
                 clicks to run it, it gains access to sensitive data and then modifies, blocks, or deletes the data. It
                 cannot copy itself from one computer to another.

                 Spyware

                 Spywares programs infect computers and collect information without the owner’s knowledge or
                 consent. A spyware generally infects a computer system by getting transmitted through internet,
                 websites, webpages, e-mails or through network of computers. It intrudes into a computer and
                 quietly steals the data of the computer. In other words, it refers to a type of software designed
                 to monitor the activities of a computer system and report to the users. An example of spyware is
                 a keylogger, which records keystrokes to capture sensitive information.

                 To prevent the attacks of spyware:
                 •  Use anti-spyware (software).
                 •  Avoid exploring error dialogs on Internet.

                 •  Avoid using free deal offers on Internet.
                 •  Ensure the authenticity of a program before installing it on your computer

                 •  Keep your operating system and software up to date.
                 •  Be cautious with email attachments and links.
                    Info Byte


                     The term ‘trojan’  is derived  from the Trojan  Horse story  in Greek  mythology,  which
                     explains  how  the  Greeks  were able  to  enter the  fortified city  of  Troy by  hiding  their
                     soldiers in a big wooden horse given to the Trojans as a gift. The Trojans were very fond
                     of horses and trusted the gifts blindly. At night, the soldiers emerged and attacked the
                     city from inside.


                                                                                                                  33
                                                                                                Computer Virus
   30   31   32   33   34   35   36   37   38   39   40