MALWARE
“MALWARE = MALICIOUS + SOFTWARE = HARMFULL SOFTWARE .”
· Malware is software used or created to disrupt computer operation, gather Sensitive information, or gain access to private computer systems.
• It can appear in the form of code, scripts, active content, and other software.
• 'Malware' is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software.
TYPES OF MALWARE
• Viruses
• Trojan
• Horses
• Worms
• Spyware
• Zombie
• Phishing
• Spam
• Adware
• Ransom ware
TROJAN HORSE
Trojan horse is a program that acts as a malicious or harmful code.it designed to cause some malicious activity or to provide a backdoor to your system.
Example - Beast, Rat, Net bus, Girlfriend etc.
VIRUS
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation VIRUS Stands for “Vital Information Resource Under Seize”.
Backdoor
A program that allows a remote user to execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers
Hijackers
A program that attempts to hijack certain Internet functions like redirecting your start page to the hijacker's own start page, redirecting search queries to a undesired search engine, or replace search results from popular search engines with their own information
WORM
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
Spyware
Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.
Spyware does not necessarily spread in the same way as a virus or worm. Most spyware is installed without users' knowledge, or by using deceptive tactics. Spyware may try to deceive users by bundling itself with desirable software. Most common example is key-logger.
ADWARE
Adware or advertising - supported software, is any software package that automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process.
ZOMBIE
Zombie programs take control of your computer and use it and its Internet connection to attack other computers or networks or to perform other criminal activities.
PHISHING
• Phishing (pronounced like the word 'fishing') is a message that tries to trick you into providing information like your social security number or bank account information or login and password for a web site.
• The message may claim that if you do not click on the link in the message and log onto a financial web site that your account will be blocked, or some other disaster.
QUESTIONS
Q.1 First virus is?
A. I Love You B. Blaster C. Sasser D. Creeper
Ans.(D)
Q.2. McAfee is an example of?
A. Photo Editing Software B. Quick Heal
C. Virus D. Antivirus
Ans.(D)
Q.3. Which of the following is known as malicious software?
A. illegal ware B. badware C. malware D. malicious ware
Ans.(C)
Q.4. To protect a computer from virus, you should install___ in your computer?
A. backup wizard B. disk cleanup
C. antivirus D. disk defragmenter
Ans.(C)
Q.5. VIRUS full form is?
A. Very Intelligent Result Until Source
B. Very Interchanged Resource Under Search
C. Vital Information Resource Under Siege
D. Viral Important Record User Searched
Ans.(C)
Q.6. Which of the following is not an antivirus software?
A. Avera B. Mcafee C. Quick Heal D. DOS
Ans.(C)
Q.7. What is short for malicious software (is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)?
A. Malware B. Malicia C. Software D. None of these
Ans.(A)
Q.8. Which of the following is/are threats for electronic payment systems?
A) Worm B) Virus C) Trozen Horse D) All
Ans.(D)
Q.9. Which of the following virus overtake computer system, when it boots and destroy information?
A) Infector B) Trozen C) Stealth Virus D) Infection
Ans.(C)
Q.10. What is key logger?
A) Worm B) Virus C) Key Logger D) Spam
Ans.(C)