|
1 -*- mode: outline; coding: utf-8 -*- |
|
2 |
|
3 * Classification. |
|
4 |
|
5 Malware (malicious software) is software designed to infiltrate a computer |
|
6 system without the owner's informed consent. |
|
7 |
|
8 ** Virus. |
|
9 |
|
10 Program that has infected some executable software and that causes that |
|
11 software, when run, to spread the virus to other executable software. |
|
12 |
|
13 Viruses may also contain a payload that performs other actions, often |
|
14 malicious. |
|
15 |
|
16 ** Worm. |
|
17 |
|
18 Worm is a program that actively transmits itself over a network to infect |
|
19 other computers. |
|
20 |
|
21 Worms may also contain a payload that performs other actions, often malicious. |
|
22 |
|
23 ** Trojan horses. |
|
24 |
|
25 Trojan horse is any program that invites the user to run it, concealing a |
|
26 harmful or malicious payload. |
|
27 |
|
28 One of the most common ways that spyware is distributed is as a Trojan horse, |
|
29 bundled with a piece of desirable software that the user downloads from the |
|
30 Internet. |
|
31 |
|
32 ** Rootkits. |
|
33 |
|
34 Rootkit is a program which modifying the host operating system so that the |
|
35 malware is hidden from the user. |
|
36 |
|
37 Rootkits can prevent a malicious process from being visible. |
|
38 |
|
39 ** Backdoors. |
|
40 |
|
41 A backdoor is a method of bypassing normal authentication procedures. Once a |
|
42 system has been compromised, one or more backdoors may be installed in order |
|
43 to allow easier access in the future. |
|
44 |
|
45 ** Spyware. |
|
46 |
|
47 Spyware is a type of malware that is installed on computers and collects |
|
48 information about users without their knowledge. |
|
49 |
|
50 The presence of spyware is typically hidden from the user. |
|
51 |
|
52 Sometimes, spywares such as keyloggers are installed by the owner of a shared, |
|
53 corporate or public computer on purpose in order to secretly monitor other |
|
54 users. |
|
55 |
|
56 ** Adware. |
|
57 |
|
58 Adware or advertising-supported software is any software package which |
|
59 automatically plays, displays, or downloads advertisements to a computer after |
|
60 the software is installed on it or while the application is being used. |
|
61 |
|
62 ** Botnets. |
|
63 |
|
64 |
|
65 |
|
66 ** Keystroke loggers. |
|
67 |
|
68 Malware programs install a key logger, which intercepts the user's keystrokes |
|
69 when entering a password, credit card number, or other information that may be |
|
70 exploited. These are then transmitted to the malware creator. |
|
71 |
|
72 ** Dialers. |
|
73 |
|
74 Electronic device that is connected to a telephone line to monitor the dialed |
|
75 numbers and alter them to seamlessly provide services that otherwise require |
|
76 lengthy access codes to be dialed. |
|
77 |
|
78 ** Screen scrapers. |
|
79 |
|
80 |
|
81 |
|
82 ** Phishing. |
|
83 |