Page 35 - Trackpad_ipro 4.1_Class7
P. 35

Worms

                 A computer worm is a type of malware that can replicate itself without any human interaction. It
                 consumes a lot of memory space in replication. Once a computer has been infected by a worm,
                 its processing speed slows down, it works unexpectedly, and halts other tasks. A computer
                 worm can spread itself from one computer to another through the replication process.
                 Trojan Horse

                 The purpose of a trojan horse is to conceal itself inside a software that seems legitimate. When
                 the software is installed on the system, the trojan activates and infects the host system.
                 Clickipedia


                   The term ‘trojan’ is derived from the Trojan Horse story in Greek mythology, which explains
                   how the Greeks were able to enter the fortified city of Troy by hiding their soldiers in a
                   large wooden horse given to the Trojans as a gift. The Trojans were very fond of horses and
                   trusted the gift blindly. In the night, the soldiers emerged and attacked the city from within.

                 Spyware

                 Spyware is a type of malware that monitors a user's activity and sends the collected information
                 back to a hacker.  Spyware does not have any infection mechanisms  of its own.  It is  usually
                 dropped by trojans (and also by viruses and worms). Once dropped, it installs itself on the victim’s
                 computer and remains there silently to avoid detection.
                 Ransomware


                 Ransomware is malicious software that locks or encrypts the victim’s data, making it inaccessible.
                 The attacker then demands a large sum of money to unlock or decrypt the data. The term 'ransom'
                 refers to the money demanded to release a kidnapped hostage, similar to how ransomware
                 demands payment to return access to the victim’s data.
                 Rootkit

                 Rootkit is a type of malware that gains administrator access to the host system. Once the attacker
                 has access to the system, the rootkit hides itself but retains special access to the system. Detection
                 of a rootkit is challenging because it can bypass tracking software due to its elevated access.
                 Backdoor

                 Backdoor is a type of malicious software that enters the computer bundled with other software
                 or files. It is used to gain remote access to the host computer.
                 Clickipedia



                       ✶ Most of the malware programs are distributed over the Internet, often bundled with other
                      software.

                       ✶ The best way to guard against malware is to install an antivirus software.






                                                                                               Computer Virus    33
   30   31   32   33   34   35   36   37   38   39   40