To understand what kinds of threats to your data are there, it helps to know what types of malware exist and how these work. In general, the malware can be divided into the following classes:
Classic viruses: Programs that infect other programs by adding code to take control after the execution of infected files. The main purpose of a virus is infecting. The speed of propagation of the virus is somewhat lower than that of the worms.
Network worms: This type of malware uses to distribute network resources. His name means they can penetrate from one computer to another like a worm. They do so via email, instant messaging systems, file-sharing networks (P2P), IRC channels, local networks, global networks, etc. Its propagation speed is very high.
To penetrate a computer, the worm tries to obtain the addresses of other computers on the network to start sending copies. They also tend to use the data book contacts email client. Most worms spread as files but there is a small amount of worms that spread in the form of network packets and directly penetrate the victim computer's RAM, which then execute your code.
Trojans: This class of malware includes a variety of programs that perform actions without the user's knowledge and without their consent, collect data and send them to the criminals, destroy or alter data with criminal intent, causing damage to computer operation or use computer resources for criminal purposes, such as mass mailing of unsolicited email.
They are classics because virus does not infect other programs or data. Trojans can not penetrate to the equipment itself, but spread by criminals under the wing of a software "desirable" and are capable of causing much more harm than classic viruses.
Spyware: Software that allows the collection of information about a user or organization in an unauthorized manner. Their presence can be completely invisible to the user and they can collect data on user actions, the contents of the hard drive, installed software, quality and connection speed, etc.
Phishing: Is a variety of spyware that spreads via email to receive confidential user data, of a preferred bank. The phishing emails are designed to look like legal correspondence sent by banking organizations, or some well-known brands. These emails contain a link that redirects users to a fake page that will ask to some sensitive data such as the number of credit card.
Adware: Display advertising to the user. Most Adware programs are installed as free software. The advertisement appears in the interface. Sometimes they can collect and send user's personal data.
Riskware: They are not malicious but contain a potential threat. In certain situations put your data at risk. Include remote administration programs, bookmarks, etc.
Jokes: This group includes programs that do not cause direct damage to the computers they infect. However, show false warnings about alleged harm occurred or occur. May be messages warning users that the disks are formatted, which has found a virus or symptoms of infection have been detected. The possibilities are limited only by the sense of humor the author of the virus.
Rootkits: A rootkit is a collection of programs used by a hacker to evade detection while seeking to gain unauthorized access to a computer. This is accomplished in two ways: replacing system files or libraries, or by installing a kernel module. The hacker installs the rootkit after, getting a similar access to the user, usually crack a password or exploiting a vulnerability, which allows you to use other credentials to gain access to root or administrator.
Other malicious programs: There are a number of programs that do not directly affect computers, but are used to create viruses, Trojans or illegal activities such as operating system attacks and penetrate other computers, etc.
Spam: Unsolicited messages from unknown senders are sent en masse for advertising, political propaganda, seeking help, and more. Another kind of spam makes proposals relating to various illegal operations. Emails are also dedicated to steal passwords or credit card numbers, chain letters, etc. Spam creates an additional burden on email servers and can cause loss of desired information.
Classic viruses: Programs that infect other programs by adding code to take control after the execution of infected files. The main purpose of a virus is infecting. The speed of propagation of the virus is somewhat lower than that of the worms.
Network worms: This type of malware uses to distribute network resources. His name means they can penetrate from one computer to another like a worm. They do so via email, instant messaging systems, file-sharing networks (P2P), IRC channels, local networks, global networks, etc. Its propagation speed is very high.
To penetrate a computer, the worm tries to obtain the addresses of other computers on the network to start sending copies. They also tend to use the data book contacts email client. Most worms spread as files but there is a small amount of worms that spread in the form of network packets and directly penetrate the victim computer's RAM, which then execute your code.
Trojans: This class of malware includes a variety of programs that perform actions without the user's knowledge and without their consent, collect data and send them to the criminals, destroy or alter data with criminal intent, causing damage to computer operation or use computer resources for criminal purposes, such as mass mailing of unsolicited email.
They are classics because virus does not infect other programs or data. Trojans can not penetrate to the equipment itself, but spread by criminals under the wing of a software "desirable" and are capable of causing much more harm than classic viruses.
Spyware: Software that allows the collection of information about a user or organization in an unauthorized manner. Their presence can be completely invisible to the user and they can collect data on user actions, the contents of the hard drive, installed software, quality and connection speed, etc.
Phishing: Is a variety of spyware that spreads via email to receive confidential user data, of a preferred bank. The phishing emails are designed to look like legal correspondence sent by banking organizations, or some well-known brands. These emails contain a link that redirects users to a fake page that will ask to some sensitive data such as the number of credit card.
Adware: Display advertising to the user. Most Adware programs are installed as free software. The advertisement appears in the interface. Sometimes they can collect and send user's personal data.
Riskware: They are not malicious but contain a potential threat. In certain situations put your data at risk. Include remote administration programs, bookmarks, etc.
Jokes: This group includes programs that do not cause direct damage to the computers they infect. However, show false warnings about alleged harm occurred or occur. May be messages warning users that the disks are formatted, which has found a virus or symptoms of infection have been detected. The possibilities are limited only by the sense of humor the author of the virus.
Rootkits: A rootkit is a collection of programs used by a hacker to evade detection while seeking to gain unauthorized access to a computer. This is accomplished in two ways: replacing system files or libraries, or by installing a kernel module. The hacker installs the rootkit after, getting a similar access to the user, usually crack a password or exploiting a vulnerability, which allows you to use other credentials to gain access to root or administrator.
Other malicious programs: There are a number of programs that do not directly affect computers, but are used to create viruses, Trojans or illegal activities such as operating system attacks and penetrate other computers, etc.
Spam: Unsolicited messages from unknown senders are sent en masse for advertising, political propaganda, seeking help, and more. Another kind of spam makes proposals relating to various illegal operations. Emails are also dedicated to steal passwords or credit card numbers, chain letters, etc. Spam creates an additional burden on email servers and can cause loss of desired information.
Article Source: http://EzineArticles.com/?expert=Herry_Willson
No comments:
Post a Comment