software which attacks our system,it could be like some kind of file ,encruption of file structure ,try to do illegal transction those are computer virus . For example; In this you can get some kind of ads or triggers that you can get free Iphone or some kind of pop- ups and if you clicks them they download automatically .
2. Computer Worm : In this it dose
not require any triggers or popup . it self-menuplates .if a computer has computer worm it will it will automatically regenerates and self –transfer & self- connects with others computers , so this is computer worm . 3. Scare Ware: Most of thr organisation appoint it & it’s a very comman things ,in this they tries to scare you into buying their product , so this scare ware . for example : some kind of popup that your phone storage is full download our app , so this scare ware. Generally we get it when we are browsing or using internet
4. Key logger : It is also a comman
thing , there are many software for keylogger . it is something which is installed once on your computer , it will login all the key which you type on the computer , it is a very good tool to figure out the passwords of indivisuals . 5. Adware: It is also a comman thing . in this when you search on google & suddenly you got many ads by search by searched. These are not google ads it is basically adware is obtained from your google search .
6. Malware : It is very generalize term
. we can call it as computer virus , computer worm , spyware , adware or many threats . its can may be crash or window of pc. And can do many problems in it.
7. Backdoor : It is more towards the
network security . In this the hackers, used as a backdoor programme to access your computer. 8. TROJAN : It looks like a normal thing or behaviour , but in the backend of this normal behaviour we have many viruses , Malware worms , which can be excuted .
9. RANSOMWARE : IN this the hacker
asks some money and you don’t give them they hack your data , they will delete your hard drive . 10. Spyware : IT is basically they are trying to moniter you they figure out how you are using services.