Malware & Ransonware
Virus
- Self-replicating programs that spread malicious codes
- Require activation from the user
Worm
- Self-replicating programs that spread malicious codes
- Do not require activation from the user
Trojan Horse
- Non-replicating programs that pretend to be legitimate but are designed to infiltrate devices
Spyware
- Allows people to monitor user activities and collect data without the user’s knowledge
Adware
Image Source: Flicker
RATS
- A backdoor, or a remote access tool that allows a person remote access to devices
Rootkit
- A rootkit allows an unauthorized user to gain root privileges; designed to hide its presence
Ransomware
Image source: Wikimedia Commons
Botnet
- A network of compromised devices that hackers can use to mount attacks
- The infected devices are called bots or zombies
Keyloggers
- Records everything a user type without the user’s knowledge
Logic Bomb
- Denoted when a certain event is triggered
APT
- Advanced persistent threats are sophisticated hackers gaining access to a device or system and remain inside for a prolonged period of time