264
|
1 |
-*- mode: outline; coding: utf-8 -*-
|
|
2 |
|
|
3 |
* Classification.
|
|
4 |
|
|
5 |
Malware (malicious software) is software designed to infiltrate a computer
|
|
6 |
system without the owner's informed consent.
|
|
7 |
|
|
8 |
** Virus.
|
|
9 |
|
|
10 |
Program that has infected some executable software and that causes that
|
|
11 |
software, when run, to spread the virus to other executable software.
|
|
12 |
|
|
13 |
Viruses may also contain a payload that performs other actions, often
|
|
14 |
malicious.
|
|
15 |
|
|
16 |
** Worm.
|
|
17 |
|
|
18 |
Worm is a program that actively transmits itself over a network to infect
|
|
19 |
other computers.
|
|
20 |
|
|
21 |
Worms may also contain a payload that performs other actions, often malicious.
|
|
22 |
|
|
23 |
** Trojan horses.
|
|
24 |
|
|
25 |
Trojan horse is any program that invites the user to run it, concealing a
|
|
26 |
harmful or malicious payload.
|
|
27 |
|
|
28 |
One of the most common ways that spyware is distributed is as a Trojan horse,
|
|
29 |
bundled with a piece of desirable software that the user downloads from the
|
|
30 |
Internet.
|
|
31 |
|
|
32 |
** Rootkits.
|
|
33 |
|
|
34 |
Rootkit is a program which modifying the host operating system so that the
|
|
35 |
malware is hidden from the user.
|
|
36 |
|
|
37 |
Rootkits can prevent a malicious process from being visible.
|
|
38 |
|
|
39 |
** Backdoors.
|
|
40 |
|
|
41 |
A backdoor is a method of bypassing normal authentication procedures. Once a
|
|
42 |
system has been compromised, one or more backdoors may be installed in order
|
|
43 |
to allow easier access in the future.
|
|
44 |
|
|
45 |
** Spyware.
|
|
46 |
|
|
47 |
Spyware is a type of malware that is installed on computers and collects
|
|
48 |
information about users without their knowledge.
|
|
49 |
|
|
50 |
The presence of spyware is typically hidden from the user.
|
|
51 |
|
|
52 |
Sometimes, spywares such as keyloggers are installed by the owner of a shared,
|
|
53 |
corporate or public computer on purpose in order to secretly monitor other
|
|
54 |
users.
|
|
55 |
|
|
56 |
** Adware.
|
|
57 |
|
|
58 |
Adware or advertising-supported software is any software package which
|
|
59 |
automatically plays, displays, or downloads advertisements to a computer after
|
|
60 |
the software is installed on it or while the application is being used.
|
|
61 |
|
|
62 |
** Botnets.
|
|
63 |
|
|
64 |
|
|
65 |
|
|
66 |
** Keystroke loggers.
|
|
67 |
|
|
68 |
Malware programs install a key logger, which intercepts the user's keystrokes
|
|
69 |
when entering a password, credit card number, or other information that may be
|
|
70 |
exploited. These are then transmitted to the malware creator.
|
|
71 |
|
|
72 |
** Dialers.
|
|
73 |
|
|
74 |
Electronic device that is connected to a telephone line to monitor the dialed
|
|
75 |
numbers and alter them to seamlessly provide services that otherwise require
|
|
76 |
lengthy access codes to be dialed.
|
|
77 |
|
|
78 |
** Screen scrapers.
|
|
79 |
|
|
80 |
|
|
81 |
|
|
82 |
** Phishing.
|
|
83 |
|