Malware
As wikipedia states "malware" is an umbrella term, used for intrusive softwares, it includes many other terms which on their own requires a little briefing, the terms under this umbrella are
- Virus
- Worms
- Trojans
- Ransom Wares
- Botnet
- Rootkits.
These are all very confusing terms, today I am going to give an differentiating definitions to all the above terms.
Virus
A computer virus is a code, which when present in a computer system brings unstability to the system. A true virus cannot replicate itself from one computer system to another computer system without human assistance. It is inactive until it is executed and system has no impact of it’s presence but as soon as it is executed it starts infecting the system. Mostly common function of a computer virus is to replicate it’s copy. Some advance viruses even modifies themselves in their replication process. The major impact of these is the occupation of time of the processor and space on the hard disk
Worms
They come with an advancement in the category ‘virus’, as once they are executed they can transmit or transfer themselves over network, or they have capability of travelling through networks. These can be stopped on if a firewall is implemented between the networks or a good antivirus is present in the system. The basic procedure followed by the firewall and antiviruses to block these worms are to block the ports through they can travel. Also it does not reuire an attachment program to travel or perform it's function(programmed).
Trojans
Trojans commonly known as Trojan horse. Generally a Trojan horse is non-replicating type of malware. The term is derived from the Ancient Greek story of the wooden horse that was used to help Greek troops invade the city of Troy by stealth. Trojan are generally used for remote accessing to steal or corrupt data. A very important point to note is that, Static IP is used to get remote access of the infected system. There are two kind of Trojans
- Direct Trojan
- Reverse Trojan
These are also known as RAT(Remote Accessing Tool), as they are used to gain remote access to the infected system
Ransomware
AS the name suggest ‘Ransom Ware ’ are a type of malware stops you from using your PC. It holds your PC or files for ransom. Often the ransomware will claim you have done something illegal with your PC, and that you are being fined by a police force or government agency. These claims are false. It is a scare tactic designed to make you pay the money without telling anyone who might be able to restore your PC. There is no guarantee that paying the fine or doing what the ransomware tells you will give access to your PC or files again.
Bot/Botnets
These are the compromised machines which are used for DDOS(Distrubuted Denail Of Services) purpose. And victims of this attack have no clue that they are the part of a serious attach which is going on a particular website. And these bots are instructed to form a network, this network of bots is known as botnet. These botnets are also known as Zombie Army. Thus the bot is known as Zombie. The largest known botnet is 'ZEUS'
Rootkit
A rootkit is a type of software designed to hide the fact that an operating system has been compromised. These kind of malwares are used to encrypt the other kind of malwares. ootkits are used to encapsulate the virus code till the time it will not reach its destination.hence will protect it from detection as sheild on the code. Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook.
Post a Comment