You are on page 1of 2

LAGUTIN, CARLO S.

BSIT – 3C

CHARACTERISTICS OF THE DIFFERENT TYPES OF MALWARE

1. WORM
A computer worm is a type of malicious software program whose primary
function is to infect other computers while remaining active on infected systems. A
computer worm is self-replicating malware that duplicates itself to spread to uninfected
computers.
A computer worm is a malicious piece of software that replicates itself from
one computer to another with the goal of overtaking the entire network of computers.
Most worms are designed to infiltrate systems by exploiting their security failures, while
very few also try to change the system settings.
Worm malware disguises itself as legitimate software. A worm can execute
independently of the host system. A worm must be triggered by an event on the host
system. Once installed on a host system, a worm does not replicate itself.

2. VIRUS
A virus is a specific type of malware that self-replicates by inserting its code into
other programs. Computer viruses have been prominent since almost the beginning of
the commercial internet: The first one was created in 1982 for the Apple II, and other
versions quickly followed.
 virus is malicious software that cybercriminals program to reproduce. It usually
does so by attacking and infecting existing files on the target system. Viruses must
execute to do their dirty work, so they target any type of file that the system can
execute.

3. SPYWARE
Spyware is a type of malicious software -- or malware -- that is installed on a
computing device without the end user's knowledge. It invades the device, steals
sensitive information and internet usage data, and relays it to advertisers, data firms or
external users
Spyware gathers your personal information and relays it to advertisers, data
firms, or external users. Spyware is used for many purposes. Usually it aims to track
and sell your internet usage data, capture your credit card or bank account information,
or steal your personal identity.
spyware is most often distributed via malicious emails and websites, you
shouldn't open any attachments or click on any links that are included in suspicious
emails or messages you receive on social media.

4. TROJAN HORSE
Trojan horse, or Trojan, is a type of malicious code or software that looks
legitimate but can take control of your computer. A Trojan is designed to damage,
disrupt, steal, or in general inflict some other harmful action on your data or network.
A Trojan acts like a bona fide application or file to trick you.

Trojan horse malware may cause annoying computer problems, but can also
cause fatal problems, including;
 malicious software or code running on an end device.
 an attack that slows or crashes a device or network service.
 the use of stolen credentials to access private data.
 a network device that filters access and traffic coming into a network.

5. ROOTKIT
A rootkit is a collection of computer software, typically malicious, designed to
enable access to a computer or an area of its software that is not otherwise allowed (for
example, to an unauthorized user) and often masks its existence or the existence of
other software.

The main purpose of rootkits is to mask malware payloads effectively and


preserve their privileged existence on the system. For that reason, a rootkit will conceal
files, malware processes, injected modules, registry keys, user accounts or even
system registries running on system boot.

A rootkit allows someone to maintain command and control over a computer


without the computer user/owner knowing about it. Once a rootkit has been installed,
the controller of the rootkit has the ability to remotely execute files and change system
configurations on the host machine.

You might also like