0% found this document useful (0 votes)
13 views3 pages

Malicious Software

Malware, or malicious software, is harmful to computers, networks, or servers and can vary in severity from mild to disastrous. Common types of malware include viruses, worms, Trojan horses, ransomware, spyware, rootkits, and adware, each with distinct methods of operation and goals. These malicious programs can steal, encrypt, delete data, and monitor user activity, posing significant risks to users and systems.

Uploaded by

rs8731549
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views3 pages

Malicious Software

Malware, or malicious software, is harmful to computers, networks, or servers and can vary in severity from mild to disastrous. Common types of malware include viruses, worms, Trojan horses, ransomware, spyware, rootkits, and adware, each with distinct methods of operation and goals. These malicious programs can steal, encrypt, delete data, and monitor user activity, posing significant risks to users and systems.

Uploaded by

rs8731549
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Malicious Software and some common Malware

Malicious (खराब) Software/ Malware


Malware, or malicious software, is any program or file that is intentionally harmful to a computer,
network or server.
Depending upon the types of malware and its goal, this harm may present itself differently to the
user or end point. In some cases, the effect of malware has is relatively mild and benign, and in
others, it can be disastrous.
Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.
This malicious program steal, encrypt and delete sensitive data; alter or hijack core computing
functions and monitor end users’ computer activity.
1. Virus: A virus is the most common type of malware that can execute itself and spread by
infecting other programs or files. It cannot self replicate.

2. Worm: A worm can self-replicate without a host program and typically spreads without
any intersection from the malware authors.
3. Trojan horse: A Trojan horse is designed to appear as a legitimate software program to
gain access to a system. Once activated following installation, Trojans can execute their
malicious functions.
4. Spyware: Spyware collects information and data on the device and user, as well as
observes the user’s activity without their knowledge.

5. Ransomware: Ransomware infects a user’s system and encrypts its data. Cybercriminals
then demand a ransom payment from the victim in exchange for decrypting the system’s
data.

6. Rootkit: A rootkit obtains administrator-level access to the victim’s system. Once


installed, the program gives threat actors root or privileged access to the system.
7. Adware: Adware tracks a user’s browser and download history with the intent to display
pop-up or banner advertisements that lure the user into making a purchase. For example,
an advertiser might use cookies to track the webpages a user visits to better target
advertising.

You might also like