This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: 1 of 4 Malicious software, also known as malware, is often only a nuisance, but increasingly, malicious software can damage data, computers, and computer networks. Examples include Trojan horses, vandalware, spyware, hoaxes, some virusesincluding macro virusesand worms. All of these terms are explained in the first topic of this guide. Topics in this guide: Types of Malicious Software Learn to Identify Malicious Software Protect Yourself Against Malicious Software Clean Malicious Software from Your Computer Trojan horses are programs that appear harmless at first (they often arrive as an e-mail joke or amusing program), but contain a hidden function that creates damage. Unlike viruses, Trojan horses do not attach themselves to files, they simply carry out their malicious instructions. Trojan horses are stand-alone programs that cannot be cleaned and should be deleted when found. Vandalware is software that steals information for monetary gain. Often hidden inside spyware, vandalware includes backdoor Trojan horses (Trojan horses that open a secret door to your computer or network), hacker tools (password crackers, network sniffers, keystroke loggers, and more), remote administration tools (RATs), robots (BOTs), dialers, and tools used to initiate distributed denial of service (DDoS) attacks. Spyware/Adware is any software that secretly gathers user information through a users Internet connection, usually for advertising purposes. Once installed, spyware monitors a users activity on the Internet and transmits the information secretly to another party. Hoaxes , sometimes called hoax viruses, are fake reports of true viruses. Hoaxes are not real, but they trick people into responding as if a real virus attack were imminent. Hoaxes are damaging because they cause slowdowns in business operations, lost productivity through wasted time, and take up valuable network bandwidth....
View Full Document
This note was uploaded on 06/06/2011 for the course MIS 651 taught by Professor Randall during the Spring '11 term at UCLA.
- Spring '11