Page 93 - TP-Play_V-2.0_Book-8
P. 93

Worms

            A computer worm is a type of malware that has the capability to replicate itself without any
            human interaction. It consumes lots of memory space in replication. Once a computer has
            been infected by a worm, its processing speed gets slow-down, works unexpectedly and
            halts other tasks. A computer worm can spread itself from one computer to the other by

            replication process.
            Trojan Horse

            The purpose of a trojan horse is to conceal itself inside the software that seems legitimate. When
            the software is installed on the system, the trojan gets activated and infects the host system.


             Tech

               Funda
                              The term ‘trojan’ is derived from the Trojan Horse story in Greek mythology,
                              which explains how the Greeks were able to enter the fortified city of Troy
                              by hiding their soldiers in a big wooden horse given to the Trojans as a gift.
                              The Trojans were very fond of horses and trusted the gift blindly. In the
                              night, the soldiers emerged and attacked the city from inside.


            Spyware

            The primary function of spyware is to snoop on a user’s activity and send back the information it
            gathers to a hacker. Spyware does not have any infection mechanisms. It is usually dropped by

            trojans (and also by viruses and worms). Once dropped, it installs itself on the victim’s computer
            and sits there silently to avoid detection.
            Zombie

              A zombie works in a similar way as spyware do. Although the infection mechanisms remain
            the same, a zombie does not usually collect information from the computer. Instead, it just sits
            there waiting for commands from the hacker. At times, hackers can infect tens of thousands of
            computers, turning them into zombie machines.
            Ransomware


            Ransom is the money demanded to release the hostage kidnapped for the purpose. Similarly,
            ransomware is malicious software used to kidnap the data of the host system by encrypting it.
            The victim of the host system has to pay a huge amount of money to the attacker to get back
            access to data.
            Rootkit

            Rootkit is a malware that gains administrator access to the host system. Once the attacker
            gains access to the system, the rootkit gets hidden but retains special access to the system.
            The detection of rootkit is difficult as having special access to the system, it bypasses the

            tracking software.

                                                                          Computer Safety and Security       93
   88   89   90   91   92   93   94   95   96   97   98