Revision 5
Revision 5
Revision 5
1
4. Spyware:
Spyware is a software that is installed on a computer without the user knowing about it.
It is a program that secretly records what a user does on their computer
It Can gather information like Web browsing history.
It Can capture e-mail messages
It Can capture a user’s personal data…
…such as usernames and passwords as well as credit card information
And transmits this data to a third party over the internet.
5. A ‘bot’ – short for robot – is a software program that performs automated, repetitive tasks. Bots
typically copy or replace human behavior. One of the most common ways in which bots infect your
computer is via downloads.
A malicious bot is self-replicating malware designed to infect a host computer and connect
to a central server.
They have the worm-like ability to spread by duplicating.
Bots can have the ability to log keystrokes, collect passwords, capture and analyse
Data packets
They can launch DDoS attacks, pass on spams and open back doors on the
infected network
They infect networks in a way that escapes immediate notice
6. Ransomware is malicious software that can publish the victim's data or block
access to user’s computer unless a ransom or money is paid.
It encrypts the victim's files making them difficult to decipher and demands a ransom
payment to decrypt them.
It mostly controls a PC as a computer worm or Trojan horse
Most ransomware attacks are the result of clicking on an infected email attachment
or visiting compromised websites.
Some ransomware allows use of the computer but prevents the opening of certain
files
Worm:
A malicious program that replicates itself…
…until it fills all of the storage space on a drive or network
Uses security holes in networks
Usually a small self-contained program that invades computers on a
network
A worm locates a computer’s vulnerability and spreads within its connected
network
Worms often originate from e-mail attachments that appear to be from
trusted senders
Worms then spread to a user’s contacts via their e-mail account and
address book.
2
Worms can slow down a network…
…by consuming bandwidth
3
4