"MALICIOUS CODES"
MALICIOUS CODES is the kind of harmful computer or web script designed to create system vulnerabilities leading to back doors, security breaches, information and data theft, and other potential damages to files and computing systems. It's a type of threat that may not be blocked by antivirus software on its own. According to Kaspersky Lab, not all antivirus protection can treat certain infections caused by malicious code, which is different from malware. Malware specifically refers to malicious software, but malicious code includes website that can exploit vulnerabilities in order to upload malware.
Types of Malicious Code and Virus:
Computer Virus: A computer virus is a self replicating computer program which can be attach itself to other files/programs, and can execute secretly when the host program/file is activated. When the virus is executed, it can perform a number of tasks, such as erasing your files/hard disk, displaying nuisance information, attaching to other files.
Worms: A worm is a self-replicating program that does not need to attach to a host/program/file. Unlike viruses, worms can execute themselves. Worms have the ability to spread over a network and can initiate massive and destructive attacks in a short period of time.
Trojan Horse: A trojan horse is a non-replicating program that appears legitimate, but actually performs malicious and illicit activities when executed. Attackers use trojan horses to steal a user's password information, or they may simply destroy programs or data on the hard disk. It is hard to detect as it is designed to conceal its presence by performing its functions properly.
Spyware & Adware: Spyware is a type of software that secretly forwards information about a user to third parties without user's knowledge ore consent. This information can include a user's online activities, files accessed on the computer, or even user's keystrokes.
Adware, on the other hand, is a type of software that displays advertising banners while a program is running. Some adware can also be spyware. They first spy on and gather information from a victim's computer, and then display an advertising banner related to the information collected.
Rootkit: A rootkit is a collection of lines that alter the standard functionality of an operating system on a computer in a malicious and stealthy manner. By altering the operating system, a rootkit allows an attacker to act as a system administer on the victim's system. Many rootkits are designed to hide their existence and the changes they made to a system. This makes it very difficult to determine whether a rootkit is present on a system, and identify what has been changed by the rootkit.
Active Content: Unlike the traditional methods of working with static data files using a software program, today's data objects, such as web pages, email and documents can inter ware data and code together, allowing dynamic execution of program code on the user's computer. The fact that these data objects are frequently transferred between users security concern.
Zombies and Botnets: A zombie computer, usually known in the short form zombie, is a computer attached to the internet that has been compromised and manipulated without the knowledge of the computer owner. A botnet refers to a network of zombie computers that have been taken over and put under the remote control of an attacker.
A botnet might consist of thousands of zombie computers, and even more. The zombie computers in the botnet can consist of computers at homes, schools, businesses, and governments scattered around the world.
Scareware: Scareware, or sometimes called rogueware, compromises several classes of ransomware or scam software with malicious payloads. While pretending as legitimate anti-virus software or the likes, scareware is in fact dummy software without functions, or sometimes even a malicious software which may, for example, steal the victim's personal information and credentials such as password or credit card details. Ransomeware makes your computer files in accessible. The victim is then requested to pay a fee ("ransom") to regain access to their files.
No comments:
Post a Comment