Professional Documents
Culture Documents
Computer Virus
• self-replicates and attaches itself to other files/programs
• capable of executing secretly when the host program is activated
• types of Computer virus are Memory-Resident Virus, Program File Virus,
Boot Sector Virus and Email Virus
Worms
• self-replicating program which automatically executes itself
• Worms spread over a network and are capable of launching a cumbersome and destructive attack within a
short period.
Rootkit
• alters the regular functionality of an OS on a computer in a stealthy manner.
• helps the hacker to take full control of the system and acts as the system administrator on the victim’s system
• Almost all the rootkits are designed to hide their existence.
Spyware/Adware
• Secretly records information about a user and forwards it to third parties
• Adware as the name interprets displays advertising banners while a program is running deployed to
gather confidential information.
• Basically, to spy on and gather information from a victim’s computer.
Trojan Horses
• non-replicating program that appears legitimate
• secretly performs malicious and illicit activities when executed
• Hackers make use of trojan horses to steal a user’s password
information, destroy data or programs on the hard disk.
It is hard to detect!