Tuesday, November 19, 2019

CIS assigntment #2 Essay Example | Topics and Well Written Essays - 500 words

CIS assigntment #2 - Essay Example There are different types of Malware present in the market and they are used by their attackers to perform different activities. Some of the malware present in the wolrd of computers to day include: Viruses – These can be said to be one of the oldest malwares that have been present in the world of computers (Brodkin, 2013). Viruses are programs that have been designed to replicate themselves so as to spread from computer to computer causing havoc wherever they infect. They affect the computers they infect in a number of ways including changing the behavior of the computer, erasing data and stealing information that may be stored on the computer. Viruses embed themselves onto other program files in the computer and are activated when the user attempts to open the infected file (Brodkin, 2013). They can be spread through a downloaded file that contains the virus which is transferred from one computer to another. Trojans – These malware is named after the Greek mythology of the Trojan horse due to their innocent appearance to the user so as to avoid suspicion of the actual danger that they yield (Brodkin, 2013).Once they are activated however, they are able to achieve a number of attackers on the Personal Computer such as causing continuous irritations such as unrelated pop up windows to more harmful acts such as the deletion of programs and the creation of backdoors into the computers files. The fact that Trojans present themselves as harmless programs make them harder to detect and a user may be more vulnerable to this form of malware. Remote Access Trojans (RATs) are those that can create a backdoor system that allow the hacker access to one’s computer and is even able to send commands via root access capabilities (Brodkin, 2013). Backdoors – These are programs that are designed to allow the creator undetected access to a computer system once they have been installed. Backdoors can be used by hackers to steal information from a server

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.