Malicious software, commonly known as malware, is any software that brings harm to a computer system. Malware can be in the form of worms, viruses, trojans, spyware, adware and rootkits, etc., which steal protected data, delete documents or add software not approved by a user.
Malware is software designed to cause harm to a computer and user. Some forms of malware “spy” on user Internet traffic. Examples include spyware and adware. Spyware monitors a user’s location and if enabled, it can capture sensitive information, e.g., credit card numbers, promoting identity theft. Adware also acquires user information, which is shared with advertisers and then integrated with unwanted, triggered pop-up ads.Worms and viruses behave differently, as they can quickly proliferate and undermine an entire computer system. They also may perform unsavory activities from a user’s computer without the user’s knowledge. In the wake of a virus or worm, a computer system can experience significant damage.Anti-malware should determine if there are threats by scanning a computer and removing them, if found. Prevention is better than corrective action after infection. Although anti-virus programs should be continually enabled and updated, certain types of threats, like spyware, often make their way into a computer system.
At all times, a firewall should be in place for additional security. Multiple, compatible protective sources are encouraged as additional insurance against malware.
- Virus: Code that runs on a computer with the user’s knowledge; it infects the computer when the code is accessed and executed.
- Worms: Much like viruses except that they self-replicate whereas a virus does not.
- Trojan Horse: Appear to perform desired functions but are actually performing malicious functions behind the scenes.
- Spyware: Type of malicious software that is either downloaded unwittingly from a website or is installed along with some other third-party software.
- Rootkit: Software designed to gain administrator-level access to the core of a system without being detected.
**Source by wikipedia **
To Become Certified For CompTIA A+ Please Visit This Link ;
Also published on Medium.