Malware: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 9: | Line 9: | ||
|- | |- | ||
| valign="top" | <big>'''Types of Malware'''</big><br> | | valign="top" | <big>'''Types of Malware'''</big><br> | ||
[[File:Virus_Icon.svg|frameless|20px]] '''Viruses''': Viruses are self-replicating programs that attach themselves to legitimate files or software. When the infected file is executed, the virus spreads to other files and can cause a range of damage, from data corruption to system crashes. | [[File:Virus_Icon.svg|frameless|20px]] '''Viruses''': Viruses are self-replicating programs that attach themselves to legitimate files or software. When the infected file is executed, the virus spreads to other files and can cause a range of damage, from data corruption to system crashes.<br> | ||
[[File:worms_icon.svg|frameless|20px]] '''Worms''': Worms are standalone malware programs that spread across networks and devices by exploiting vulnerabilities. Unlike viruses, worms do not need to attach to files to propagate. They can rapidly infect numerous devices, leading to network congestion and data theft. | [[File:worms_icon.svg|frameless|20px]] '''Worms''': Worms are standalone malware programs that spread across networks and devices by exploiting vulnerabilities. Unlike viruses, worms do not need to attach to files to propagate. They can rapidly infect numerous devices, leading to network congestion and data theft.<br> | ||
[[File:horse_icon.svg|frameless|20px]] '''Trojans''': Trojans, named after the Trojan Horse from Greek mythology, are deceptive malware programs that appear to be legitimate software but carry hidden malicious payloads. Once installed, they can steal sensitive data, grant remote access to attackers, or perform other malicious actions. | [[File:horse_icon.svg|frameless|20px]] '''Trojans''': Trojans, named after the Trojan Horse from Greek mythology, are deceptive malware programs that appear to be legitimate software but carry hidden malicious payloads. Once installed, they can steal sensitive data, grant remote access to attackers, or perform other malicious actions.<br> | ||
[[File:lock_icon.svg|frameless|20px]] '''Ransomware''': Ransomware is a type of malware that encrypts a victim's data and demands a ransom in exchange for the decryption key. Paying the ransom is discouraged, as it does not guarantee the return of data and encourages further criminal activity. | [[File:lock_icon.svg|frameless|20px]] '''Ransomware''': Ransomware is a type of malware that encrypts a victim's data and demands a ransom in exchange for the decryption key. Paying the ransom is discouraged, as it does not guarantee the return of data and encourages further criminal activity.<br> | ||
[[File:spy_icon.svg|frameless|20px]] '''Spyware''': Spyware secretly collects user information and transmits it to malicious actors. This can include browsing habits, login credentials, and personal data. Spyware is often used for espionage or identity theft. | [[File:spy_icon.svg|frameless|20px]] '''Spyware''': Spyware secretly collects user information and transmits it to malicious actors. This can include browsing habits, login credentials, and personal data. Spyware is often used for espionage or identity theft.<br> | ||
[[File:ad_icon.svg|frameless|20px]] '''Adware''': Adware displays unwanted advertisements, often in the form of pop-ups or banners, to generate revenue for the malware's creators. While not as destructive as other malware types, adware can be highly annoying and intrusive. | [[File:ad_icon.svg|frameless|20px]] '''Adware''': Adware displays unwanted advertisements, often in the form of pop-ups or banners, to generate revenue for the malware's creators. While not as destructive as other malware types, adware can be highly annoying and intrusive. |