1-Virus.
A virus is a malicious program that attaches itself to executable files
and spreads when those infected files are executed. It can damage or
alter files, programs, and the operating system.
2-Worm.
Unlike viruses, worms do not need executable files to spread. They
replicate themselves and spread through networks, exploiting
vulnerabilities in operating systems and software
3-Trojan.
Trojans disguise themselves as legitimate programs to deceive the user
and gain unauthorized access to the system. They can provide remote
access to the attacker, steal information, or install other types of
malware.
4-Spyware.
Spyware is used to collect information about user activities without
their knowledge. It can record keystrokes, capture screens, or gather
personal data and then transmit it to the attacker.
5-Adware.
Adware displays unwanted advertisements in the form of pop-ups or
banners on the infected device. Its main objective is to generate
revenue through intrusive advertising, but it can also slow down the
system's performance.
6-Botnets.
A botnet is a network of compromised computers that are remotely
controlled by an attacker. They can be used to carry out coordinated
attacks, such as DDoS, information theft, or spam distribution.
7-Ransomware.
Ransomware encrypts files in the system and demands a ransom to provide
the decryption key. It is extremely harmful, as it can cause irreparable
data loss and negatively impact businesses and users.
Comments
Displaying 0 of 0 comments ( View all | Add Comment )