Malware

Description

Mal my ware daddy
Marvin Suwandee
Mind Map by Marvin Suwandee, updated more than 1 year ago
Marvin Suwandee
Created by Marvin Suwandee over 5 years ago
5
0

Resource summary

Malware
  1. Virus'
    1. A virus will often be designed to delete or corrupt data.
      1. This is a piece of code that is designed to replicate itself throughout the computer or network. For example it will add itself to a file on your computer and, every time the file is opened, the virus runs and once more seeks out other files to infect.
      2. Worm
        1. This behaves just like a virus, but does not necessarily harm files. Instead, it tries to copy itself so many times that the whole system runs out of resources and crashes.
          1. One of the most famous worms is the ILOVEYOU email worm. In 2000, it managed to infect nearly 10% of all internet connected computers, causing an estimated $8 billion in damages.
          2. Trojan
            1. Named after the famous Greek story of the Trojan Horse.
              1. A trojan appears to be a harmless application - a downloaded game for example. You play the game, but meanwhile it is running in the background carrying out its real intent - maybe letting someone else access to your computer.
              2. Spyware
                1. Spyware is often used for identity theft or to gather passwords for bank accounts.
                  1. Spyware stays hidden out of view and is designed to spy on your computer, looking for personal information, passwords and so on.
                  2. Ransomware
                    1. Ransomware encrypts critical files and data, making them unusable. Eventually it presents the user with a ransom, demanding money be sent to the attackers to unlock the system.
                    2. Scareware
                      1. Scareware will cause a pop-up to appear on your screen which will say something like 'Your computer has a virus.
                        1. In reality, you do not actually have a virus. The scareware it trying to frighten you into purchasing and downloading the software which itself may actually contain malware.
                        2. Rootkits
                          1. Rootkits give other people permissions and access to your computer, allowing them to take it over remotely and do whatever they like.
                            1. It is designed to run even before the operating system itself is booted up and it continues to stay active in the background while you are using the computer.
                            Show full summary Hide full summary

                            Similar

                            Computer Security
                            Mr A Esch
                            Hacking quiz
                            Luigi3106 YT
                            security threats
                            jacob stenning
                            Chapter 5: Keeping data safe and secure, keywords
                            Victoria Heppinstall
                            System Threats
                            Lana-Mae Garrett
                            VIRUS INFORMÁTICO
                            FRANKLIN ANILEMA
                            Riesgos en internet
                            Julieth del Carmen Aroca Diaz
                            Chapter 5: Keeping data safe and secure overview
                            Victoria Heppinstall