Malware is malicious independent programs that disguise themselves as helpful, such as a screensaver or build themselves into free downloads.
When this malware is loaded onto a computer system, it can capture information from the system, such as usernames and passwords.
Access to usernames and passwords will allow hackers or crackers to control the computer system remotely.
Table of Contents
Type of Malware
Malware can cause significant damage to privacy and security. There are three (3) types of malware.
- Computer Worm
- Logic Bombs
- Trojan Horse
1) Computer Worm
Computer Worms do not have to attach themselves to a computer program. Still, they are independent programs that replicate themselves by spending copies of files on other computers in the network.
The network infected by the computer worm is damaged, as a lot of bandwidth is used to send millions of messages in the form of spam emails.
Computer worms usually affect the computer’s memory and cause the system to be unresponsive.
2) Logic Bombs
Logic bomb malware remains hidden in the central computer system and will only be activated at some point.
The logic bombs will only be activated when users begin to use the program.
Then they begin destroying data in the computer system.
3) Trojan Horse
Trojan horse, another type of malware, impersonates itself as an independent and legitimate software program.
The Trojan horse then attaches itself to the computer system.
Once triggered by a pre-set event or date in the computer system, it destroys files or disks.
Malware is a dangerous and malicious program disguised as helpful software or downloads.
Once it infects a computer system, it can capture sensitive information such as usernames and passwords, allowing hackers to take control of the system remotely.
There are three main types of malware, including.
computer worms – that replicate themselves and cause network damage
logic bombs – that remain hidden and destroy data at a later time
Trojan horses – are programs that impersonate legitimate software and destroy files or disks.
It is crucial to protect against malware to ensure privacy and security.