Sunday, September 8, 2013

2. Discuss different types of threats and malicious program (malware) that can damage a computer, mobile device or disrupt any system. Search for information on current known malware program. Based on the information that you have found, create a table to list different types of malware, what it does, and how it can be repaired or removed. These information is useful for you to prevent any malware from damage your computer system.

Type of Malware

Effect
Ways to treat it






Phishing

The phishing scam masquerades as a legitimate website or link to a site, but what it’s really trying to do is “fish” for information. By fooling you into thinking that you’re visiting your bank or a shopping or government website, the scam gets you to divulge personal or financial information, which the Bad Guys then exploit.
              *  Check e-mail address from sender.
              *Don’t not open e-mail from an unknown sender.
                *Mark it as spam.






Spyware

Like its name says, spyware monitors your movements on the Internet, sending information back to a central computer that then targets you with advertising. It sounds okay, but the category has broadened to include programs you download to your computer that monitor your activities to the point that your computer slows down to a useless state. Further, the spyware itself becomes nearly impossible to remove.
               * Disconnect from the internet.
                *Scan the computer.
             *Uninstall unwanted software.




Trojan Horse

The Trojan program is malware that masquerades as a legitimate  program. The program may have a legitimate function, but it carries ulterior motives. Trojans can delete data, compromise security, relay spam or porn, and otherwise infect your computer.
              *  Reboot the computer.
             *Start with safe mode.
              *Install an original anti-virus.
             *Scan computer and remove virus.






Virus

Like its living counterpart, a computer virus infects your computer, taking control over some or all of its functions. The virus destroys data or looks for things like passwords, credit card numbers, or other sensitive data. This information is often sent to another computer. A virus can also use your computer to relay spam email or pornography or to coordinate attacks against websites on the Internet.
                *Scan computer with anti-virus software.
                *Reboot computer.
              *Remove





Worm

Officially, a worm is a virus that replicates itself over a network. Worms often arrive via email, peruse your address book, and then send a copy of themselves to others in your address book, masquerading the message as though it’s from you. Worms are used to deliver viruses, or the worm itself might be a virus, because the terms are interchangeable.
     * Disconnect from internet.
            *Best to format the computer. 

No comments:

Post a Comment