Question

In: Computer Science

What are some types of malware?

What are some types of malware?

Solutions

Expert Solution

Answer:

  1. Adware:. The least dangerous and most lucrative Malware. Adware displays ads on your computer.
  2. Spyware:. Spyware is software that spies on you, tracking your internet activities in order to send advertising (Adware) back to your system.
  3. Virus: A virus is a contagious program or code that attaches itself to another piece of software, and then reproduces itself when that software is run. Most often this is spread by sharing software or files between computers.
  4. Worm: A program that replicates itself and destroys data and files on the computer. Worms work to “eat” the system operating files and data files until the drive is empty.
  5. Trojan: The most dangerous Malware. Trojans are written with the purpose of discovering your financial information, taking over your computer’s system resources, and in larger systems creating a “denial-of-service attack ” Denial-of-service attack: an attempt to make a machine or network resource unavailable to those attempting to reach it. Example: AOL, Yahoo or your business network becoming unavailable.
  6. Rootkit: This one is likened to the burglar hiding in the attic, waiting to take from you while you are not home. It is the hardest of all Malware to detect and therefore to remove; many experts recommend completely wiping your hard drive and reinstalling everything from scratch. It is designed to permit the other information gathering Malware in to get the identity information from your computer without you realizing anything is going on.
  7. Backdoors: Backdoors are much the same as Trojans or worms, except that they open a “backdoor” onto a computer, providing a network connection for hackers or other Malware to enter or for viruses or SPAM to be sent.
  8. Keyloggers: Records everything you type on your PC in order to glean your log-in names, passwords, and other sensitive information, and send it on to the source of the keylogging program. Many times keyloggers are used by corporations and parents to acquire computer usage information.  
  9. Rogue security software: This one deceives or misleads users. It pretends to be a good program to remove Malware infections, but all the while it is the Malware. Often it will turn off the real Anti-Virus software. The next image shows the typical screen for this Malware program, Antivirus 2010
  10. Ransomware: If you see this screen that warns you that you have been locked out of your computer until you pay for your cybercrimes. Your system is severely infected with a form of Malware called Ransomware. It is not a real notification from the FBI, but, rather an infection of the system itself. Even if you pay to unlock the system, the system is unlocked, but you are not free of it locking you out again. The request for money, usually in the hundreds of dollars is completely fake.
  11. Browser Hijacker: When your homepage changes to one that looks like those in the images inserted next, you may have been infected with one form or another of a Browser Hijacker. This dangerous Malware will redirect your normal search activity and give you the results the developers want you to see. Its intention is to make money off your web surfing. Using this homepage and not removing the Malware lets the source developers capture your surfing interests. This is especially dangerous when banking or shopping online. These homepages can look harmless, but in every case they allow other more infectiou

Related Solutions

1. What is cybercrime? What are some examples of it? 2. What is malware? Describe and...
1. What is cybercrime? What are some examples of it? 2. What is malware? Describe and differentiate between viruses, worms, Trojan horses, logic bombs, time bombs, spyware, etc. 3. What are security patches and antivirus software? How do they fit in to modern methods of combatting malware? 4. What are hacking, Webjacking, and DoS attacks? The essay should be at least 300 words and not copied, the words should be self written.
1. What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments...
1. What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments in computer technology or have they been around for a while? What piece of malware/virus are choosing to write about and why?  
What is the name for a device infected with malware that an attacker uses to control...
What is the name for a device infected with malware that an attacker uses to control the device remotely?
Describe the malware detection symptoms
Describe the malware detection symptoms
What is venture capital, and what types of firms receive it? What are some of the...
What is venture capital, and what types of firms receive it? What are some of the important services provided by underwriters? What type of underwriting is the most common in the United States, and how does it work? What is IPO underpricing, and why might it persist? What are some of the costs associated with issuing securities? What is a rights offering, and how do you value a right? What are some of the characteristics of private placement debt? What...
What are the three types of heat transfer and what are some examples and application of...
What are the three types of heat transfer and what are some examples and application of each type? Which type do you encounter the most in your everyday life?
what is a stock option that organizations issue? What are some of the types of options...
what is a stock option that organizations issue? What are some of the types of options available?
What are some of the different types of budgets used by a manufacturing organization? What are...
What are some of the different types of budgets used by a manufacturing organization? What are these budgets used for? Are these same budgets used by service organizations? Why or why not?
what is fraud, what causes fraud and what are some of the types of fraud currently...
what is fraud, what causes fraud and what are some of the types of fraud currently being perpetrated in the world. Please be sure to support your posting with citations from two articles which you will attach to your posting as a document.
1. How does malware infect a computer? 2. How does malware spread? 3. How does the...
1. How does malware infect a computer? 2. How does malware spread? 3. How does the malware works? 4. Is virus and malware the same? 5. How do I manually remove malware? 6. What's an example of malware? 7. What is malware attack? 8. What is Worm malware? 9. What do computer viruses do? 10. How do I protect my computer from malware? 11. What is the best anti malware? 12. What is worm, a virus, and a Trojan horse?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT