Malware for life piffting

Beschreibung

different types of malwarwe
Beatrice Bambury-Brenner
Mindmap von Beatrice Bambury-Brenner, aktualisiert more than 1 year ago
Beatrice Bambury-Brenner
Erstellt von Beatrice Bambury-Brenner vor mehr als 5 Jahre
9
0

Zusammenfassung der Ressource

Malware for life piffting
  1. Virus
    1. A virus will add itself to a document, and then replicate itself and look for other files to infect.
    2. Worm
      1. A worm is like a virus, accept that it doesn't necessirily harm filres. It just copies itself so many times that the system crashes
      2. Trojan
        1. Named after the Greek Trojan horse, a trojan appears completely harmless, but when it is downloaded, it will carry out another objective in the background.
        2. Spyware
          1. Spyware stays out of your view so as to spy on your persinal details. The information is then sent secretly over the internet to those who want it.
          2. Adware
            1. This can force your computer to show up ads, which if you click on will take you to unwanted and/or fake websites.
            2. Pharming
              1. Pharming malware will redirect you from a website that you are going to to a fake website that looks very real.If you enter details, they can then store them and do what they like to your accounts.,
              2. Click Fraud
                1. They use your computer's resources to open websites and send a mouse click to the adverts. Every click gives them money, but you won't know they're doing it because it's all in the background.
                2. Ransomware
                  1. Ransomware encrypts critical files and data . Eventually it asks the user for a ransom for their files.
                  2. Rootkit
                    1. Rookits give other people permission to access your computer, allowing them to remotely controll it and do whatever they like.
                    2. Scareware
                      1. Scareware will acuse pop-ups to appear saying things that scare you into clicking on them and buying their fake software.
                      Zusammenfassung anzeigen Zusammenfassung ausblenden

                      ähnlicher Inhalt

                      Types and Components of Computer Systems
                      Jess Peason
                      Input Devices
                      Jess Peason
                      Output Devices
                      Jess Peason
                      A level Computing Quiz
                      Zacchaeus Snape
                      Networks
                      Will8324
                      General ICT Quiz
                      leahshaw
                      ICT Revison Flash Cards
                      Arun Johal
                      FLAT FILE VS RELATIONAL DATABASE
                      rosiejones
                      Online World - Learning Aim A
                      andysedge
                      Business Aims and ICT Strategies
                      scrt