Loading [MathJax]/jax/output/HTML-CSS/fonts/TeX/fontdata.js
Beatrice Bambury-Brenner
Mind Map by , created more than 1 year ago

different types of malwarwe

9
0
0
Beatrice Bambury-Brenner
Created by Beatrice Bambury-Brenner almost 6 years ago
Rate this resource by clicking on the stars below:
1 2 3 4 5 (0)
Ratings (0)
0
0
0
0
0

0 comments

There are no comments, be the first and leave one below:

Close
Malware for life pifftingVirusWormTrojanSpywareAdwarePharmingClickFraudRansomwareRootkitScarewareNamed after the Greek Trojan horse, a trojan appears completely harmless, but whenit is downloaded, it will carry out another objective in the background.Rookits give other people permission to access your computer, allowing them to remotely controll it anddo whatever they like.Pharming malware will redirect you from a website that you are going to to a fake website that looks very real.If you enter details, they can thenstore them and do what they like to your accounts.,This can force your computer to show up ads, which if you click on willtake you to unwanted and/or fake websites.Scareware will acuse pop-ups to appear saying things that scare you into clicking on them and buying theirfake software.Spyware stays out of your view so as to spy on your persinal details. The information is then sent secretly over theinternet to those who want it.A virus will add itself to a document, and then replicate itself and look for other files to infect.Ransomware encrypts critical files and data . Eventually it asks the user for a ransom for their files.A worm is like a virus, accept that it doesn't necessirily harm filres. It just copies itself so many times that the system crashesThey use your computer's resources to open websites and send a mouse click to the adverts. Every click gives them money, but you won't know they're doing it because it's all in the background.Double click this nodeto edit the textClick and drag this buttonto create a new node