MaliciousSoftware_LM_E - 1 of 4 Malicious software, also...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 1 of 4 Malicious software, also known as malware, is often only a nuisance, but increasingly, malicious software can damage data, computers, and computer networks. Examples include Trojan horses, vandalware, spyware, hoaxes, some virusesincluding macro virusesand worms. All of these terms are explained in the first topic of this guide. Topics in this guide: Types of Malicious Software Learn to Identify Malicious Software Protect Yourself Against Malicious Software Clean Malicious Software from Your Computer Trojan horses are programs that appear harmless at first (they often arrive as an e-mail joke or amusing program), but contain a hidden function that creates damage. Unlike viruses, Trojan horses do not attach themselves to files, they simply carry out their malicious instructions. Trojan horses are stand-alone programs that cannot be cleaned and should be deleted when found. Vandalware is software that steals information for monetary gain. Often hidden inside spyware, vandalware includes backdoor Trojan horses (Trojan horses that open a secret door to your computer or network), hacker tools (password crackers, network sniffers, keystroke loggers, and more), remote administration tools (RATs), robots (BOTs), dialers, and tools used to initiate distributed denial of service (DDoS) attacks. Spyware/Adware is any software that secretly gathers user information through a users Internet connection, usually for advertising purposes. Once installed, spyware monitors a users activity on the Internet and transmits the information secretly to another party. Hoaxes , sometimes called hoax viruses, are fake reports of true viruses. Hoaxes are not real, but they trick people into responding as if a real virus attack were imminent. Hoaxes are damaging because they cause slowdowns in business operations, lost productivity through wasted time, and take up valuable network bandwidth....
View Full Document

This note was uploaded on 06/06/2011 for the course MIS 651 taught by Professor Randall during the Spring '11 term at UCLA.

Page1 / 4

MaliciousSoftware_LM_E - 1 of 4 Malicious software, also...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online