Please enable JavaScript.
Coggle requires JavaScript to display documents.
Malware and Data Theft - Coggle Diagram
Malware and Data Theft
-
-
-
Viruses
Unlike worms, viruses need an already-infected active operating system or program to work. Viruses are typically attached to an executable file or a word document.
-
Trojan Horses
Just as it sounds, a Trojan Horse is a malicious program that disguises itself as a legitimate file.
Ransomware
Ransomware denies or restricts access to your own files. Then it demands payment (usually with crypto-currencies) in return for letting you back in.
Adware & Scams
Adware is one of the better-known types of malware. It serves pop-ups and display ads that often have no relevance to you.
Spyware
Spyware secretly records your online activity, harvesting your data and collecting personal information such as usernames, passwords and surfing habits.
Spam & Phishing
Phishing is a type of social engineering attack, rather than a type of malware. But is a common method of cyber attack.