Latest Post:

Malicious code (Malware)

 A code developed by cyber attackers, designed to cause extensive damage to data and systems or to gain unauthorized access to a network.
 Includes computer viruses, worms, Trojan horses and spyware.
 Perform a variety of different functions such as stealing, encrypting or deleting sensitive data, altering or hijacking (taking control) core computing functions and monitoring users' computer activity without their permission.Types of malware
a) A virus is the most common type of malware which can execute itself and spread by infecting other programs or files.
b) A worm can self-replicate without a host program and typically spreads without any human interaction or directives from the malware authors.
c) A Trojan horse is designed to appear as a legitimate (valid) program in order to gain access to a system. Once activated following installation, Trojans can execute their malicious functions.
d) Spyware is made to collect information and data on the device user and observe their activity without their knowledge.
e) Keyloggers, also called system monitors, are used to see nearly everything a user does on their computer. This includes emails, opened web-s, programs and keystrokes

Post a Comment

Khem Raj Poudel
Khem Raj Poudel
Khem Raj Poudel