Question 2:
Discuss different types of threats and malicious
program (malware) that can damage a computer, mobile devices or disrupt any
system.
Search for information on current known malware
program. Based on information that you have found, create a table to list
different types of malware, what it does and how it can repaired or removed.
These information is useful for you to prevent any malware from damage your
computer system.
![]() |
Illustration of a Trojan horse |
TROJAN
HORSE
Trojan
horse is defining as a malicious, security-breaking program that is disguised
as something benign. For example, when you download what appear to be a music
file from the internet but then you click on it, you unleash a program which do
harmful things to your personal computer such as deleting your disk or letting
someone to hijack your computer and commit crime from a remote location.
Computer viruses
Computer
virus is programs that spreads malicious code by copying itself and infecting
host computers and corrupt the computer system. Most viruses attached themselves
to emails and media files such as CD, DVD and USB drivers that allow the virus
to be downloaded when the files are opened.
Worms
Worms are similar to viruses which spread from
computer to computer and disturb it. But unlike virus, worm can travel without
any human action. Worms utilizes a computer network to send replicas of itself
to connecting computes on that network.
ADWARE
Adware, also known advertising-supported
software is any software application in which advertising banners are displayed
while the program itself is running. Basically, the functions may be designed
to analyze which Internet sites the user visits and to present advertising
pertinent to the types of goods or services featured there. The term is
sometimes used to refer to software that displays unwanted advertisements.
SPYWARE
Spyware is
installed secretly on a computer system that collects and sends information
about its usage and other confidential and personal data to the developer in an
unethical manner. Basically,
spyware is a tool that spammers use to attain personal information about users
which is exploited and harvested without the user's consent and can be used to
invade your privacy and compromise your personal data. They can collect
personal information from your machine and also monitor your internet website
viewing habits.
SUMMARIZATION ON TYPE OF MALWARE AND HOW CAN IT BE REPAIRED
Type of malware
|
What it does perform?
|
How it can be repaired
or removed?
|
Computer viruses
|
To corrupt the computer system
|
Installing and running antivirus or antimalware programs
|
Worms
|
Worms utilizes a computer network to send replicas of itself
to connecting computes on that network.
|
Using malware removing tools
|
Trojan horse
|
Trojan presented to the user as a form of a free useful
software or add-on, once installed the Trojan gives access to hacker then
carry out their criminal operations on the target computer from remote
station.
|
It can removed either manually or using antivirus software
program.
|
Spyware
|
It is installed secretly on a computer system that collects and sends information about its usage and other confidential and personal data to the developer in an unethical manner.
|
It can be repaired using antispyware tools.
|
Adware
|
The program is designed to display advertisements on a computer system.
|
Adware can be removed using trusted antispyware and antimalware software.
|
By:
Norazuwa Ramnor
Norazuwa Ramnor
Nurul Ain Zafirah Latif
Tiada ulasan:
Catat Ulasan