and how you can handle it. trojan horses spyware adware rootkits viruses worms software that...
TRANSCRIPT
MalwareAnd how you can handle it
Malware Trojan
horses Spyware Adware Rootkits Viruses Worms
Software that works without the victim’s permission.
Trojan horses
Like the ancient Greek legend. Look harmless but then do damage.
AdwareSpyware A program hidden
on your computer that essentally spies on you and can track key presses to possibly obtain passwords or account numbers
A program which automatically
displays advertisements on
a computer without user request
Rootkits Runs secretly. Allows the invader access to files and
folders on the infected computer. Can be used by law enforcement
officials to search a suspect’s computer.
Viruses Are obtained through downloading an
attachment on an email from a stranger or downloading a program or file from an non-trusted website.
Cause damage to files on a computer including vital operating system components.
Worms Worms duplicate themselves until the
amount of them is too much for the computer to handle and the computer eventually shuts down.
Can duplicate within a computer or over a network or the internet to cripple servers.
Anti-malware programs Help protect against cyber-attacks
like viruses and worms by either preventing them from getting onto your computer or destroying them once they’re on your computer.
Anti-malware programs
Professional help Geek Squad Staples Tech help Local computer technicians Tech support