Get premium membership and access questions with answers, video lessons as well as revision papers.
Got a question or eager to learn? Discover limitless learning on WhatsApp now - Start Now!

Explain types of malware in computer protection

      

Explain types of malware in computer protection.

  

Answers


Dominic
1,Trojan; secretly places illegal, destructive instructions in the middle of a computer program. Once the program is run, the Trojan becomes active. Trojans can delete, block, modify or copy data. They can also disrupt the performance of a computer or a network. Trojans typically enter a computer system attached to a free game or other utility. Unlike viruses, Trojans do not replicate themselves.

2,Rootkit; is another type of malware that is activated each time a computer system boots (loads) up. Rootkits are difficult to detect because they are activated before the operating system (e.g. MS Windows) has completely booted up. A rootkit often allows the installation of hidden files, hidden processes and hidden user accounts in the operating system of a computer.

3,Back door; is a secret way to access a computer without passing security mechanisms. Back doors are built into a software by the original programmer, who can gain access to the computer by entering a code locally or remotely. Typically programmers install a back door so that they can access a program for troubleshooting purposes. However, hackers often use back doors that they detect or install themselves to enter a computer system.

Other types of infectious malware include:

4,Virus; attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels. Almost all viruses are attached to an executable (.exe) file, which means that a virus may exist on a computer but it actually cannot infect a computer unless the user runs or opens the malicious program. A virus cannot be spread without human action. Viruses are usually spread by sharing infected files as email attachments or downloaded from websites.
5,Worm; is a type of malware that self-replicates and distributes copies of itself in a computer network. Worms spread from computer to computer, but unlike viruses, worms are able to infect computer systems without intervention from computer users. For example, a worm can send copies of itself to all contacts in an email address book. The worm replicates again and sends itself out to everyone listed in each of the receiver's address. Typically worms slow down computer systems and networks.

6,Adware; is a software application that automatically displays advertising banners while the program is running. The programmers of these software applications include additional code that displays advertisements in pop-up windows or in a bar on the computer screen. These advertisements sponsor the development and free use of the software applications (freeware). The advertisements disappear when users stop running the freeware software. Some freeware applications may contain adware which tracks the Internet surfing habits of users and pass this on to third parties, without the user's authorization or knowledge. The users will then receive other advertisements that are targeted to their Internet browsing habits etc. When the adware becomes intrusive like this it is considered as spyware.

7,Spyware; is a program that secretly installs itself on computers and collects information about users without their knowledge. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited. They can also interfere with user control of the computer in other ways, such as installing additional software and redirecting web browser activity. Spyware changes the computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs.

8,Botnet; is a group of computers connected together for malicious purposes. Each computer in a botnet is called a bot. These bots form a network of compromised computers used to transmit malware or spam, or to launch attacks. Botnet attacks slow down a computer network or a website.

9,Keystroke logging; is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard. Sensitive information such as usernames and passwords that are keyed in the computer may be stolen through such programs.
10, Dialer ; is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent. This will result in high telephone bills. This is possible only if users are using a dial-up modem
Dominic M answered the question on May 16, 2018 at 09:29


Next: What is a malware in computer protection?
Previous: Explain the advantages of a computer network?

View More Computer Studies Questions and Answers | Return to Questions Index


Learn High School English on YouTube

Related Questions