Please enable JavaScript.
Coggle requires JavaScript to display documents.
All about Malware (Malware type [1,2] (Virus (Copies itself to other files…
All about Malware
Malware type [1,2]
-
-
Logic bomb
Executes a set of instructions to compromise information systems based on the logic defined by its creator. Usually
programs that use either time or an event as the trigger
-
Trojan
Program that resembles a legitimate program, but has some malicious code inside.
Spyware
Malicious code that is used to spy on victim’s activities on a system and also for stealing sensitive information of the client
Rootkit
Rootkits are (set of) programs used to alter the standard operating system functionality to hide any malicious activity done by it.
Botnet
Program that does any action based on instructions received from its master or controller. A network of such bots is called a botnet.
-
-
-
Adware
Automatically plays, displays, or downloads advertisements to a computer after malicious software is installed or application is used. This piece of code is generally embedded into free software. The problem is, many developers abuse ad – supported software by monitoring Internet users’ activities .
-
Sources
-
- Monsters in the closet: Measures for Spyware awareness and prevention
- Survey on Malware Detection Methods