Professional Documents
Culture Documents
To commit fraud
ransom
1) Trojan horse
A malicious program that is disguised as useful and legitimate software.
2) Virus
Self-replicating program that spreads by inserting copies of itself into other
executable code or documents.
3) Worm
Self-replicating program, similar to virus, but is self-contained (does not
need to be part of another program). Spreads by exploiting service
vulnerabilities.
4) Backdoor
Software that allows access to a computer system bypassing the normal
authentication procedures.
5) Rootkit
A stealthy type of software, typically malicious, designed to hide the
existence of certain processes or programs from normal methods of
detection.
They generally spread via email attachments and
internet downloads.
They run without you being aware about them.
It can damage your software, hardware and files.
They both multiply and spread themselves to
other computers to cause damage.