Infection methods of malware

Cards (13)

  • Virus
    A type of malicious code or program written to alter the way a computer operates
  • designed to spread from one computer to another and the ability to replicate themselves by hooking them to the program like songs, videos etc.
    Virus
  • A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.
  • In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data.
  • a type of malware that spreads copies of itself from computer to computer
    Worms
  • can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
    Worms
  • it uses a computer network to spread itself, relying on security failures on the target computer to access it.
    Worms
  • programmed/hacked to break into user accounts, scan the internet for contact information, to send spam, or perform other harmful acts.
    Bots
  • can be seen as advanced form of worms
    Bots
  • To carry out these attacks and disguise the source of the attack traffic, attackers may distribute bad bots in a botnet – i.e., a bot network.
    Bots
  • a type of malware that is often disguised as legitimate software
    Trojans
  • can be employed by cyber-thieves and hackers trying to gain access to users’ systems.
    Trojans
  • once activated, it can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include: Deleting data, Blocking data, Modifying data and Copying data.
    Trojans