1. What are the different kinds of malicious software and what kind of countermeasures are available for us to stop them from achieving their goals?
a. Kinds of malicious software.
Adware: This is software that is typically installed by the computer user because of some free feature, and the developer gets revenue by reporting your web activity to advertisers so that targeted ads can be presented to you (Stallings & Brown, 2015).
Botnet: This is a network of zombie computers used for malicious actions on the Internet, generally without computer’s owners the knowledge (Stallings & Brown, 2015).
Drive-by-Download: This is the involuntary download of software to a user’s computer prompted by visiting a Web site or viewing an HTML structured email and without the user’s permission and even without them noticing (Stallings & Brown, 2015).
Key loggers: This distinct version of Trojans that registers all the keyboard/ mouse movement on a PC and then sends this information to the attacker (Stallings & Brown, 2015).
Malware: Simply put, this is “malicious software", and is the usually used across-the-board term for all kinds of harmful software (Stallings & Brown, 2015).
Ransomware: This is malware that demands payment for a decrypting key after encrypting your files (Stallings & Brown, 2015).
Rootkit: This is concealed malware that functions at the most low root level of the operating system (Stallings & Brown, 2015).
Spyware: This is a type of Trojan where the application that
Data Miners is also software that is used to search email and others with intentions of locating confidential information that can be sold or utilized for ads. This is a very dangerous form of spyware as it can be stealth like and a user would not even know they were infected. Trojan horses is another type that appears to act as something that they are not and utilize program names that many people may use in order to get someone to execute them. Browser Hijackers can reroute a home browser to a site in which they operate and can also function as a proxy so when an individual begins to browse through the internet, you are searching through their server and giving them the ability to observe your every move (Admin,
Spyware is Software that enables a user to obtain information about another's computer activities by transmitting data from their hard drive.
Let’s say user (A) download an execution file (EXE) on his-her PC and double click on that file, if this file is infected the virus works based on the written code by the hacker/ attacker/ intruder and copy some files into the system. In case, user (A) does not have virus protection, the virus works perfect in destroying that computer or sending information from this computer to the attacker email. Viruses not only designed to destroy PC’s, but also designed to get information from
Rootkit – Rootkit is a software that is downloaded onto a computer to ide the compromised operating system. This can allow other viruses or malware to come and make it look like it’s a necessary file for the computer. Even if you use an anti-virus, it will look at it but will think it’s a necessary file for the computer. The longer the rootkit is installed the harder it is to undo the damages
The specific program used to prevent viruses, worms and Trojans which attached in the email or website.
44. Which of the following type of program is also commonly referred to as a Trojan horse?
Is your PC still being infected by viruses and malware regardless of all of the latest anti-virus and anti-malware protection that you installed on your system? Often all it takes for a virus or malware infection is a lack of user discretion when browsing the web. Here are five of the most commonly overlooked practices that can go a long way in preventing viruses and malware.
Malware. The use of malware in cyber-attacks against businesses are increasing. Malware is software that is intended to compromise computers and computer systems. Malware can be introduced into systems through a variety of methods, which include phishing emails and visiting compromised websites.
malware that pretends to be a legitimate application. It pretends to be a legitimate application abusing the application name and icon. It cheats and prompts the user to install it. Use an Anti-Malware program
Viruses and worms are malicious programs that self-replicate on computers or through computer systems without the user being cognizant. Worms are a series programs that repeat themselves from system to system minus the use of a host fie. Worms use methods to infiltrate remote computers and launch replicas of themselves like email messages or coping files to an accessible disk. A computer virus is a
Malicious software (malware) is any product that offers control of your PC to do whatever the malware creator needs. Malware can be an infection, worm, Trojan, adware, spyware, root pack. The harm done can shift from something slight as changing the creator's name on a report to full control of your machine without your capacity to effortlessly figure out. Most malware requires the client to start its
Malwares are mischievous programs crafted to agitate or forbid normal operations to gather selected information which may lead to loss of privacy through
Just like a biological virus, a computer virus is able to infect and ruin lives. This malicious software constitutes more than just simple viruses but also includes other types of software including worms, Trojan horses, and ransomware. Malware has been around since the late 1980’s. Originally, people became hackers to gain notoriety online, but today, it has become more of a business. Cyber attacks originate from all around the world, and it is not just individual people that benefit from it. In two decades, numerous cyber crime syndicates have been created, and states all over the world sponsor hacker groups. Over the past twenty-five years, malware has become less about checking the integrity of computer security and gaining notoriety in the underground cyber society, and it has become more of a chaos creating, money making business that many people and institutions take part in.
There are an enormous amount of malicious software programs. The most common types are known as viruses and spyware. Spyware has