Friday, April 26, 2019
CIS assigntment #2 Essay Example | Topics and Well Written Essays - 500 words
CIS assigntment 2 - Essay recitationThere are different types of Malware present in the market and they are used by their attackers to finish different activities. Some of the malware present in the wolrd of computers to day includeViruses These can be said to be adept of the oldest malwares that have been present in the world of computers (Brodkin, 2013). Viruses are programs that have been designed to replicate themselves so as to spread from computer to computer causing havoc wherever they infect. They affect the computers they infect in a number of ways including changing the behavior of the computer, erasing data and stealing entropy that may be stored on the computer.Viruses embed themselves onto other program files in the computer and are activated when the user attempts to receptive the infected file (Brodkin, 2013). They can be spread through a downloaded file that contains the virus which is transferred from one computer to another.Trojans These malware is named aft er the Greek mythology of the Trojan horse due to their innocent appearance to the user so as to avoid suspicion of the actual danger that they yield (Brodkin, 2013).Once they are activated however, they are able to achieve a number of attackers on the Personal Computer such as causing sustained irritations such as unrelated pop up windows to more harmful acts such as the deracination of programs and the creation of backdoors into the computers files.The fact that Trojans present themselves as harmless programs make them harder to detect and a user may be more vulnerable to this form of malware. Remote Access Trojans (RATs) are those that can create a backdoor system that allow the hacker access to ones computer and is even able to take aim commands via root access capabilities (Brodkin, 2013).Backdoors These are programs that are designed to allow the creator undetected access to a computer system once they have been installed. Backdoors can be used by hackers to steal informa tion from a server
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment