Understanding Malware

July 28, 2018 | Views: 4607

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Introduction

Malware continues to be an issue with today’s ever-evolving technology.  It plagues everyone, from new users to advanced users; everyone can be affected by malware. The name comes from the words “malicious” and “software,” hence malware. 

Many different forms of malware exist and target many different aspects of a system. Such types include

  •  Viruses
  •  Worms
  • Trojans
  • Rootkits
  • Ransomware
  • Backdoors
  • Keyloggers
  •  Adware
  •  and many many more.

Viruses

These can be distinguished from trojans and worms by their dependency on another program to deliver their payload or code. Once started, they replicate themselves onto other programs and can perform many destructive functions.

Worms

A worm is a standalone piece of malware which replicates itself over the network that a computer is connected to. Once connected, it can do much harm, such as delivering other forms of malware or increasing bandwidth usage.

Trojan

Masquerading as harmless software, a trojan will execute once the user installs or runs a program. Trojans mostly act as spyware, keyloggers, or backdoors, but they can manifest as something else.

Rootkits

Rootkits are designed to hide the initial malware from the user. They are very hard to detect to the point that reimaging a system may be necessary to remove one (if detected). They require root/admin access to deploy.

Ransomware

This nasty piece of malware, unfortunately, is becoming more prevalent day after day. It uses a high-bit key to encrypt all your files or important files on your computer. The only way to get them back is to pay a fee (in cryptocurrency). There is no recovery except through paying once you get infected!!!

Backdoors

Backdoors are used to maintain access after an attack. They can bypass normal authentication means. Sometimes, they will intentionally be put in place by the user for ease of access.

Keyloggers

Like backdoors, these are not inherently malicious, as keyloggers record keyboard strokes, like in Notepad. But attackers can deploy them to steal credentials or other sensitive information.

Adware

We have all experienced adware, such as ads popping up on sites or apps. That is what adware is. Attackers can install adware on your computer to generate these annoying ads and can make money off of the ads in some cases.

Conclusion

While these are the basic forms of malware, many other forms exist, including logic bombs, achieve bombs, etc.

What can you do to prevent malware? Common prevention methods include things such as safe Internet practices, resistance to social engineering attacks, as they are how most types of malware are spread, and avoiding sketchy files.

Thank you!

Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel