Please enable JavaScript.
Coggle requires JavaScript to display documents.
MALWARE IMAGE MALWARE - Coggle Diagram
MALWARE
SPYWARE
Software that secretly monitors and collect personal information about users and sends it to someone else.
ADWARE
Spyware that can pop banner ads on a monitor, collect information about user's web surfing and spending habits, and forward it to the adware creator.
-
-
-
-
KEYLOGGER
Software that records computer activity, such as a user's keystrokes, e-mails sent and received, websites visited, and chat session participation.
-
TIME BOMB/LOGIC BOMB
Trojan horse that lies idle until triggered by a specified date or time, by a change in the system, by a message sent to the system, or by an event that does not occur.
-
-
STEGANOGRAPHY PROGRAM
Program that can merge confidential information with a harmless file, password protect the file and the only way to reassemble the hidden file is to key in the password.
ROOTKIT
Conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system and other programs.
VIRUS
Segment of self-replicating, executable code that attaches itself to a file or program.
WORM
Similar to virus, except that it is a program rather a code segment hidden in a host program. Worm also copies itself automatically and transmits itself to other systems.
BLUESNARFING
Stealing contact lists, images and other data using Bluetooth.
BLUEBUGGING
Taking control of someone else's phone to make or listen to calls, send or read text messages, connect to the Internet, forward the victim's calls and call numbers that charge fees.