Please enable JavaScript.
Coggle requires JavaScript to display documents.
Malware (Virus (A piece of code that is designed to replicate itself…
Malware
Virus
A piece of code that is designed to replicate itself throughout the computer/ network. A virus will often be designed to delete or corrupt data and a new virus will appear every day, due to the anti-virus companies updating their software constantly to keep up with the hackers.
Worm
Behaves just like a virus but does not usually harm files, it tries to copy itself so many times that the whole system stops working and crashes due to running out of resources.
Trojan
A Trojan will appear to be harmless application, but when you download software it will run in the background carrying out its real intent, maybe even letting someone else have access to your computer. This is where it got its name- from the Trojan horse story.
Browser Malware
Browser can become infected with malware when you download certain things such as plugins. This type of malware probably won't damage your file system, but could cause inconvenience and the creators of the malware will be making money from you.
Adware
Malware can force your browser to display unwanted popups and can cause pages that you didn't request to open up. It can also take over the browser home page and direct you somewhere else every time you open up your browser.
Click Fraud
Click fraud malware aims to use computer resources to open web sites and send a mouse click to adverts. Every click makes them money, the activity is hidden in the background so you are not aware of this.
Pharming
When you want to visit a website you type a web address into your browser. Pharming malware will infect this browser and redirect to you to an identical looking website. It does this by telling your browser to look for another IP address to the genuine site to that of the fake website and this then redirects you to the phony site. The site will look the exact same the only difference will be the URL; when you enter details such as your username and password the fake website will record this information.
Spyware
Spyware stays hidden and out of view, it is designed to spy on your computer and look for personal information. It does this by a key logger to record key pressed on the keyboard and may take screenshots; this is then sent over the internet to the criminals. Spyware is often used in identity theft to gather passwords for bank accounts.
Ransomware
Ransomware encrypts critical data and files, this makes them unusable. Eventually this prevents the user with a random and they demand money to be send to the attackers to unlock the system.
Scareware
Scareware will pop-up to appear on your screen and will say a warning about the computer and then will ask you to click a link to 'fix' or buy a software to fix the problem. You won' actually have this, the scareware is just trying o frighten you into purchasing and downloading software that will probably contain malware.
Rootkits
Rootkits give other people permissions and access to your computer this allows them to take it over and for them to do whatever they like. It is designed to run sometimes even before the system itself is booed up and it continues to stay active in the background when computer is on