0% found this document useful (0 votes)
18 views1 page

MALWARE (Malicious Software) : Hartzel A. Lelix 11 ABM - Humility

Malware refers to malicious software programs like viruses, worms, Trojan horses and spyware that can steal, encrypt or delete data, alter core functions, or monitor users without permission. Web threats utilize the internet through malware, fraud and links to facilitate cybercrime by stealing information to sell and absorb PCs into botnets. Cybercrime involves using computers and networks to intentionally harm victims directly or indirectly through modern communication networks like the internet and mobile phones. Copyright law grants intellectual property rights to owners of original expressive works like fiction, music, designs and art.

Uploaded by

Gervidaine Lelix
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views1 page

MALWARE (Malicious Software) : Hartzel A. Lelix 11 ABM - Humility

Malware refers to malicious software programs like viruses, worms, Trojan horses and spyware that can steal, encrypt or delete data, alter core functions, or monitor users without permission. Web threats utilize the internet through malware, fraud and links to facilitate cybercrime by stealing information to sell and absorb PCs into botnets. Cybercrime involves using computers and networks to intentionally harm victims directly or indirectly through modern communication networks like the internet and mobile phones. Copyright law grants intellectual property rights to owners of original expressive works like fiction, music, designs and art.

Uploaded by

Gervidaine Lelix
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

MALWARE (malicious software)

- Malware, is any program or file that is harmful to a computer user.


Types of malware can include computer viruses, worms, Trojan horses and spyware.
These malicious programs can perform a variety of different functions such as stealing,
encrypting or deleting sensitive data, altering or hijacking core computing functions and
monitoring user’s computer activity without their permission.

WEB THREAT
- A web threat is any threat that uses the World Wide Web to facilitate
cybercrime. Web threats use multiple types of malware and fraud, all of which utilize
HTTP or HTTPS protocols, but may also employ other protocols and components, such
as links in email or IM, or malware attachments or on serves that access the web. They
benefit cybercriminals by stealing information for subsequent sale and help aborb
infected PCs into botnets.

CYBERCRIME
- cybercrime, or computer-oriented crime, is a crime that involves a
computer and a network. The computer may have been used in the commission of a
crime, or it may be the target. Cybercrime can be defined as: “Offences that are
committed against individuals or groups of individual with a criminal motive to
intentionally harm the reputation of the victim or cause physical or mental harm, or
loss,to the victim directly or indirectly, using modern telecommunication networks such
as internet (networks including chat rooms, emails, notice boards and groups) and
mobile phones (Bluetooth, SMS, MMS)”. Cybercrime may threaten a person or a
nation’s security and financial health.

COPYRIGHT LAW
- A copyright is an intellectual property right granted by a government
that gives the owner exclusives right to use, with some limited exceptions, original
expressive work. Examples of materials entitled to copyright protection include original
works of fiction, non-fiction, music, architectural design, artistic paintings, and
sculptures. Copyright law in the US is governed by the Copyright Act of 1976.

Hartzel A. Lelix
11 ABM - Humility

You might also like