Vous êtes sur la page 1sur 3

WORM What it is?

Is a self replicating virus that does not make any changes to the files but reside active in memory and duplicates. How it works? It uses parts of an operating system that are automatic and usually invisible to the user. How it will be discovered? It will be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.

TROJAN What it is? Trojans are harmful programs that perform actions on the files that have not been authorized by the user. How it works? Trojan can do its chosen form of damage such as deleting data, blocking data, modifying data, copying data, and disrupting the performance of computers or computer networks. Trojans are not able to selfreplicate. How it will be discovered? There are pop-ups keep appearing on your screen even not browsing the Internet.

VIRUS What it is? In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. How it works? Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD.

How it will be discovered? The computer system is running extremely slow.

Who creates malware and why? Computer vandalism o The majority students who had just mastered a programming language and wanted to try it out o The second group young people who have not yet fully mastered the art of programming o The third group the most dangerous, more experienced virus-writer, creating professional viruses and lets them out to the world o The fourth group - researchers, rather shrewd programmers who invent new methods of infecting, concealing and resistance to anti-viruses etc. They are not spreading these creations. Petty theft o Following emergence and promotion of paid internet-services (mail, web, hosting) computer underground members start to take a interest to how to access to network at somebody elses expense, i.e. by stealing somebodys login and password (or several logins and passwords from different infected computers) by using specially developed Trojans. Cybercrime o The most dangerous group of virus writers is hackers or groups of hackers who intentionally create malicious programs in their own interests. o Support for spammers o Distributed network attacks o Stealing electronic currency o Stealing banking information o Stealing other confidential information o Cyber blackmail and cyber extortion o Targeted attacks Grey business o Beyond student virus-writers and purely criminal business in the Internet there are grey businesses - activities existing on the brink of law. Imposing electronic advertisement, utilities, offering user to visit this or that paid web-resource and other types of unwanted software they all also require technical support of hacker programmer. It is requires to secretly intrude into the system, repetitive renewal of components and various masking (to protect from deletion from the system), resist antivirus programs these aims almost fully coincide with the functional of different Trojans.

o o o

Adware Pornography and premium-pay resources Rogue antivirus and anti-spyware programs

Vous aimerez peut-être aussi