Please enable JavaScript.
Coggle requires JavaScript to display documents.
Malware - Coggle Diagram
Malware
Malware Symptoms :While these types of malware differ greatly in how they spread and infect computers, they all can produce similar symptoms. Computers that are infected with malware can exhibit any of the following symptoms
Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn off antivirus and firewall programs)
Appearance of strange files, programs, or desktop icons
-
-
Emails/messages being sent automatically and without user’s knowledge (a friend receives a strange email from you that you did not send)
-
-
-
-
Adware:Unwanted software designed to throw advertisements up on your screen, most often within a web browser.
-
-
Spyware:It gathers information about you, including the sites you visit, the things you download, your usernames and passwords, payment information, and the emails you send and receive.
-
Trojan Horse:Like its namesake, Trojan horse attacks, or simply “Trojans” use deception to trick unsuspecting users into running seemingly benign computer programs that hide malicious ulterior motives.
-
Rootkit:A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
-
Worm:A worm copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program or files in order to cause damage.
-
Malicious Bots: Botnets cause distributed denial-of-service attacks (DDoS Attack). In 2016 there was a DDoS attack that affected PSN & some Xbox Live apps.
-
Bots:Short for Robot, are small apps that perform automated tasks over the internet.
-
Computer Virus:A virus is a specific type of malware that self-replicates by inserting its code into other programs.
-
Ransomware:A type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access.
-