Type
of Malware
|
Effect
|
Ways
to treat it
|
|
Phishing
|
The phishing scam masquerades as a legitimate website or
link to a site, but what it’s really trying to do is “fish” for information.
By fooling you into thinking that you’re visiting your bank or a shopping or
government website, the scam gets you to divulge personal or financial
information, which the Bad Guys then exploit.
|
* Check e-mail address from sender.
*Don’t not open e-mail from an unknown sender.
*Mark it as spam.
|
|
Spyware
|
Like
its name says, spyware monitors your movements on the Internet, sending
information back to a central computer that then targets you with
advertising. It sounds okay, but the category has broadened to include
programs you download to your computer that monitor your activities to the
point that your computer slows down to a useless state. Further, the spyware
itself becomes nearly impossible to remove.
|
* Disconnect from the internet.
*Scan the computer.
*Uninstall unwanted software.
|
|
Trojan Horse
|
The Trojan program is malware that masquerades as a
legitimate program. The program may have a legitimate function, but it
carries ulterior motives. Trojans can delete data, compromise security, relay
spam or porn, and otherwise infect your computer.
|
* Reboot the computer.
*Start with safe mode.
*Install an original anti-virus.
*Scan computer and remove virus.
|
|
Virus
|
Like
its living counterpart, a computer virus infects your computer, taking
control over some or all of its functions. The virus destroys data or looks
for things like passwords, credit card numbers, or other sensitive data. This
information is often sent to another computer. A virus can also use your
computer to relay spam email or pornography or to coordinate attacks against
websites on the Internet.
|
*Scan computer with anti-virus software.
*Reboot computer.
*Remove
|
|
Worm
|
Officially, a worm is a virus that replicates itself over
a network. Worms often arrive via email, peruse your address book, and then
send a copy of themselves to others in your address book, masquerading the
message as though it’s from you. Worms are used to deliver viruses, or the
worm itself might be a virus, because the terms are interchangeable.
|
*Best to format the computer.
|
Sunday, September 8, 2013
2. Discuss different types of threats and malicious program (malware) that can damage a computer, mobile device or disrupt any system. Search for information on current known malware program. Based on the information that you have found, create a table to list different types of malware, what it does, and how it can be repaired or removed. These information is useful for you to prevent any malware from damage your computer system.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment