Types of Computer Malware : Explained
Malware stands for “Malicious Software”. It performs unwanted tasks. It may cause serious damage or invasion to our computer. Stealing data, stealing the password, infecting the computer are the examples of Malware programs. Even a pop-up advertising is a malware program.
“Ransomware” is in news these days and is malicious software that blocks access to the computer until money is paid.
Types of Malware
I. Virus (Vital information resource under seize): It is a computer program that spreads from one computer to another and it causes serious damage or harm to the computer system by deleting files, by deleting everything on the hard disk etc. The purpose of this program is to disrupt the operation of a computer system. It can even utilise an e-mail program to spread the virus to another computer.
II. Trojan Horse: It is not a virus. It is a computer program that seems to be a game but in reality, it damages the computer system once you run it. It may even erase the hard disk.
III. Worm: It is a type of software that makes use of security holes and computer network in order to replicate itself. It scans the network for machines that carry a security hole and then it copies itself there and starts replicating. Examples: Code Red, Mydoom, Brontok.
IV. Spyware: It is a malware installed on the computer systems that collects information about users without their knowledge. It can be used for other purpose of secretly monitoring users in firm, corporate. Collection of information includes visited websites, IP address, browser history etc. Examples of spyware are Click-Jacker, Key-logger.
V. Adware: The ads that automatically appear on our screen when we connect to the internet are displayed by financially supported software called Adware.
VI. Browser Hijacking Software: It is an advertising program that modifies our browser settings, displays pop-up advertisements and creates desktop shortcuts.
Some points regarding cyber crime
I. Cyberstalking: The use of internet or other electronic means to harass or stalk a group, an organisation or an individual. It is done in real time or even in offline mode.
II. Identity theft: It is an unauthorised access to someone’s identity or personal information to get financial benefits or any other benefits without the consent of that individual.
III. Phishing: It is a fraudulent practice of getting someone’s personal information such as login credentials, cards numbers etc through email.
IV. Eavesdropping: It is secretly listening or accessing someone’s phone calls, instant messages, video conference or fax transmission.
|Maths Topicwise Free PDF > Click Here To Download||English Topicwise Free PDF > Click Here To Download|
|GK/GS/GA Topicwise Free PDF > Click Here To Download||Reasoning Topicwise Free PDF > Click Here To Download|
|Banking Topicwise Free PDF > Click Here To Download||DI Topicwise Free PDF > Click Here To Download|
|All Subject Topicwise Short Tricks > Click Here To Download||Static GK & Awareness Topicwise Free PDF > Click Here To Download|
|Please Support us by Joining Below Groups & Like Our Pages we will be very thankful to you.|
|Facebook Page : https://www.facebook.com/governmentadda/|
|Facebook Group : https://www.facebook.com/groups/governmentadda/|
|Telegram||Official Channel : https://telegram.me/GovtAdda|
|Current Affairs Channel : https://telegram.me/Ga_Buzz|
|UPSC Channel : https://telegram.me/CivilServicesAdda|
|SSC Channel : https://telegram.me/SscAdda|
|Banking Channel : https://telegram.me/IbpsZone|
|RBI Group : https://telegram.me/RbiZone|
|Railway RRB Channel : https://telegram.me/RailwayZone|
|IT Officer Group : https://telegram.me/IT_Officer|
|Insurance Group : https://telegram.me/InsuranceZone|
|Job Alert Channel : https://telegram.me/JobAlert|
|Youtube||Click Here To Subscribe Now|
Share & Support Us