Page 35 - Trackpad_ipro 4.1_Class7
P. 35
Worms
A computer worm is a type of malware that can replicate itself without any human interaction. It
consumes a lot of memory space in replication. Once a computer has been infected by a worm,
its processing speed slows down, it works unexpectedly, and halts other tasks. A computer
worm can spread itself from one computer to another through the replication process.
Trojan Horse
The purpose of a trojan horse is to conceal itself inside a software that seems legitimate. When
the software is installed on the system, the trojan activates and infects the host system.
Clickipedia
The term ‘trojan’ is derived from the Trojan Horse story in Greek mythology, which explains
how the Greeks were able to enter the fortified city of Troy by hiding their soldiers in a
large wooden horse given to the Trojans as a gift. The Trojans were very fond of horses and
trusted the gift blindly. In the night, the soldiers emerged and attacked the city from within.
Spyware
Spyware is a type of malware that monitors a user's activity and sends the collected information
back to a hacker. Spyware does not have any infection mechanisms of its own. It is usually
dropped by trojans (and also by viruses and worms). Once dropped, it installs itself on the victim’s
computer and remains there silently to avoid detection.
Ransomware
Ransomware is malicious software that locks or encrypts the victim’s data, making it inaccessible.
The attacker then demands a large sum of money to unlock or decrypt the data. The term 'ransom'
refers to the money demanded to release a kidnapped hostage, similar to how ransomware
demands payment to return access to the victim’s data.
Rootkit
Rootkit is a type of malware that gains administrator access to the host system. Once the attacker
has access to the system, the rootkit hides itself but retains special access to the system. Detection
of a rootkit is challenging because it can bypass tracking software due to its elevated access.
Backdoor
Backdoor is a type of malicious software that enters the computer bundled with other software
or files. It is used to gain remote access to the host computer.
Clickipedia
✶ Most of the malware programs are distributed over the Internet, often bundled with other
software.
✶ The best way to guard against malware is to install an antivirus software.
Computer Virus 33

