Wednesday, June 12, 2019

CIS assigntment #2 Essay Example | Topics and Well Written Essays - 500 words

CIS assigntment 2 - Essay ExampleThere are different types of Malware present in the market and they are used by their attackers to perform different activities. Some of the malware present in the wolrd of computers to day includeViruses These slew be said to be one of the oldest malwares that have been present in the world of computers (Brodkin, 2013). Viruses are programs that have been designed to replicate themselves so as to public exposure from computer to computer do havoc wherever they infect. They affect the computers they infect in a number of ways including changing the behavior of the computer, erasing data and stealing information that may be stored on the computer.Viruses embed themselves onto other program files in the computer and are activated when the user attempts to open the infected file (Brodkin, 2013). They can be spread through a downloaded file that contains the virus which is transferred from one computer to another.Trojans These malware is named after the Greek mythology of the Trojan horse due to their innocent appearance to the user so as to avoid suspicion of the actual danger that they yield (Brodkin, 2013).Once they are activated however, they are able to achieve a number of attackers on the personal Computer such as causing continuous irritations such as unrelated pop up windows to more harmful acts such as the baseball swing of programs and the creation of backdoors into the computers files.The fact that Trojans present themselves as harmless programs make them harder to detect and a user may be more vulnerable to this form of malware. removed(p) Access Trojans (RATs) are those that can create a backdoor system that allow the hacker access to ones computer and is even able to transport commands via root access capabilities (Brodkin, 2013).Backdoors These are programs that are designed to allow the creator undetected access to a computer system once they have been installed. Backdoors can be used by hackers to steal inf ormation from a server

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.