MALWARES:------ INTRODUCTION, CLASSIFICATION, & TIPS FOR BEING SECURE......
INTRODUCTION: WHAT IS A MALWARE?????????????????
A malware is a malicious software designed to harm a computer system without
the owner's informed consent. Malware software, is software used or
programmed by attackers to disrupt computer operation, gather sensitive
information, or gain access to private computer systems. It can appear in the
form of code, scripts, active content, and other software. Malware is a general
term used to refer to a intrusive software.Malware includes computer viruses,
worms, Trojan horses, rootkits, spyware, dishonest adware,crimeware and other
malicious and unwanted software.Around 80% of malware today is designed to
steal and find confidential information stored on your computer.This type of
malware is sometimes called crimeware.Malware can invade your machine
through infected email attachment, "bots" that crawl the internet looking for
unprotected computers.
MLWARE CLASSIFICATIONS: TYPES AND DESCRIPTIONS......................
VIRUS: A virus is a program which is able to replicate and attach itself to a
program or files infecting the system without your knowledge.This are
the software programs that hide on your computer and cause its
damage
.
Spyware: Spyware is a malicious software program that hides on your computer,
tracks what you are doing online, and sends that information over the
internet.Some types of softwares like keyloggers can records what you
are typing in your computer and lot others you can't imagine.
Trozan horse: For a malicious program to accomplish its goals, it must be able to
run without being detected, shut down, or deleted. When a malicious
program is disguised as something normal or desirable, users may
willfully install it without realising it. This is the technique of the
Trojan horse or trojan. A Trojan horse is any program that invites the
user to run it, concealing harmful or malicious code. The code may
take effect immediately and can lead to many undesirable effects, such
as deleting the user's files or installing additional harmful software.
Rootkits: Once a malicious program is installed on a system, it is essential that
it stay concealed, to avoid detection. Techniques known as rootkits
allow this concealment, by modifying the host's operating system so
that the malware is hidden from the user. Rootkits can prevent a
malicious process from being visible in the system's list of processes,
or keep its files from being read.
TIPS TO SECURE:
* Set the browser to open the webpages only from the trusted web sites.
* Always checks for the extension of a file and always scan any attached files
before using it.
* Always scan the removable mediums before you open.
* Avoid downloading the files with double extension.
* Always use anti-virus software and also update its signature database when
available.
* Try to avoid the attachment from unknown users.
INTRODUCTION: WHAT IS A MALWARE?????????????????
A malware is a malicious software designed to harm a computer system without
the owner's informed consent. Malware software, is software used or
programmed by attackers to disrupt computer operation, gather sensitive
information, or gain access to private computer systems. It can appear in the
form of code, scripts, active content, and other software. Malware is a general
term used to refer to a intrusive software.Malware includes computer viruses,
worms, Trojan horses, rootkits, spyware, dishonest adware,crimeware and other
malicious and unwanted software.Around 80% of malware today is designed to
steal and find confidential information stored on your computer.This type of
malware is sometimes called crimeware.Malware can invade your machine
through infected email attachment, "bots" that crawl the internet looking for
unprotected computers.
MLWARE CLASSIFICATIONS: TYPES AND DESCRIPTIONS......................
VIRUS: A virus is a program which is able to replicate and attach itself to a
program or files infecting the system without your knowledge.This are
the software programs that hide on your computer and cause its
damage
.
Spyware: Spyware is a malicious software program that hides on your computer,
tracks what you are doing online, and sends that information over the
internet.Some types of softwares like keyloggers can records what you
are typing in your computer and lot others you can't imagine.
Trozan horse: For a malicious program to accomplish its goals, it must be able to
run without being detected, shut down, or deleted. When a malicious
program is disguised as something normal or desirable, users may
willfully install it without realising it. This is the technique of the
Trojan horse or trojan. A Trojan horse is any program that invites the
user to run it, concealing harmful or malicious code. The code may
take effect immediately and can lead to many undesirable effects, such
as deleting the user's files or installing additional harmful software.
Rootkits: Once a malicious program is installed on a system, it is essential that
it stay concealed, to avoid detection. Techniques known as rootkits
allow this concealment, by modifying the host's operating system so
that the malware is hidden from the user. Rootkits can prevent a
malicious process from being visible in the system's list of processes,
or keep its files from being read.
TIPS TO SECURE:
* Set the browser to open the webpages only from the trusted web sites.
* Always checks for the extension of a file and always scan any attached files
before using it.
* Always scan the removable mediums before you open.
* Avoid downloading the files with double extension.
* Always use anti-virus software and also update its signature database when
available.
* Try to avoid the attachment from unknown users.
No comments:
Post a Comment