Cyberattacks are carried out using various types of malware (malicious software)
Viruses
Programs that can replicate themselves and be spread from one system to another by attaching themselves to host files. They are used to modify or corruptinformation on a targetedcomputer system.
Worms
Self-replicatingprograms that identify vulnerabilities in operating systems and enable remote control of the infected computer.
Spyware
Installed by opening attachments or downloadinginfected software. Spyware can be used to collect stored data without the user’s knowledge.
Trojans
Programs that appears to perform a useful function, but also provide a ‘backdoor’ that enablesdata to be stolen.