(Malicious Software)
Malware
Virus
Spyware
Trojan
Scareware
Worms
Not covered: ransomware, adware, nagware etc
| Spreading Method | Characteristics | Effect | Protection /Clean up Method |
|
|---|---|---|---|---|
| Virus | By copying infected files | Able to replicate itself Attach itself to a file .exe, master boot, autorun etc |
PC inoperable Delete or corrupt files |
Antivirus |
| Trojan | ?? | Doesn't replicate itself create backdoor and allows PC to be remotely controlled |
use for DDOS attack, use as proxy to send SPAM and concealing attack. | Antivirus |
| Spyware | ?? | when installed at PC collect info such as password, collect credit card information | steal valuable information PC will be slow if too many spyware |
Antivirus cannot clean spyware |
| Spreading Method | Characteristics | Effect | Protection /Clean up Method |
|
|---|---|---|---|---|
| Scareware | tricked to installed fake antivirus software | when installed the scareware will inform PC is infected with virus to clean up to pay full licenses | unable to use PC until payment | Antivirus cannot use malware clean up service or google the steps. |
| Worms | via network (e.g by sending emails) |
take advantage on outdated network software such as email server to spread out | consume bandwidth | ?? |
References
https://lifehacker.com/5560443/whats-the-difference-between-viruses-trojans-worms-and-other-malware