The root cause of all security threats is malware which is
basically a malicious software code designed to disrupt, harm or whip the
Internet and Software world. Based on the design of malware these are
categorized into various categories viz. Virus, worm, trojan and boots. These
malware are as such powerful that if designed then they can cause a huge data
and financial loss. The question remains – how
to save from such threats? You know it, by knowing about it.
The word ‘Malware’
means malicious software that pretty much means everything that harms computers
or network. The application of malware is completely based on its designed and
purpose, as some are designed to corrupt
computer memory, some to replicate itself, some logging keyboard keystrokes, some steal
financial information, some act as a backdoor and so much more. Therefore,
based on the use and purpose the malware is categorized as followings:
DIFFERENT
SECURITY THREATS
A Virus is a malicious program that replicates itself from
one location to another, or even from one system to others though copying of
files or through network.
Commonly, most of the viruses are executable, but can come
in varieties of tastes like macros, autoruns or even as a simple file in some
cases. However, the root cause remains the same as the main purpose is either
to delete files or corrupt files.
Virus Awareness:
Say, you’re downloading a video of format ‘.flv’,
but if you see the download file extension as ‘.flv.exe’ then you can be dealing with the virus. Stay tuned!
To stay on the safe side, install an anti-virus program and keep
it updated and do not introduce malicious file and software into your system.
Worms are no much different then virus in a feature that worms
replicate themselves and can cause the same level of destruction as virus can.
However, worms are standalone malicious program that affects the system by
exploiting vulnerability or in most cases, though social engineering where user
sis forced to download worms though email or by clicking some link.
Although, worms are sub-version of virus but are as much
powerful because of their capability to replicate themselv enormously though
network , system memory or causing
web server to not respond.
Examples: W32.SillyFDC.BBY, Vecna.22528 and
W32.MyLife.C@mm
Hacker’s first choice
– Trojans! Trojans are a peace of harmful code that are designed to control
almost the whole of the system when tricked to install. It looks like genuine
software, but when activated can achieve a number of attacks from irritating
dialogue boxes to damaging the complete system.
Commonly, Trojans are downloaded from email attachments,
running certain programs in internet or come bundled with sound looking
software.
Bots are not basically a malicious thing. Bots are derived
from word ‘robot’, and can be used for both good and bad purposes. Typically,
bots are used in web crawlers over search engines or for creating an automated
system for messaging and other web productions.
However, when designed malicious Bots can do a lot more than
other form of malware. One can choose to create a botnet for instance, which is
a collection of bots from list of compromised system and network to be used as
desired, be it – distributed denial of service attack, gather financial
information, relay spams, flooded traffic to crash server and so forth.
On top of aforementioned, there exists various types of other malware like spyware (a program to collect your information without your knowledge), scareware (a program that pretends like an antivirus program, but when loaded
infects your system with hundreds of virus), exploit (a simple piece of
code that exploit particular vulnerability of a particular system), backdoors (a program that allows a secret and bypassed access to to your system)
and the list is on going as security and hacking is undergoing a great fight. Choose your side of the fence and stay
tuned!