By: Gonzalo Linares, Diana Barbed & Víctor Medina
 Viruses
 Trojans
 Worms
 Spyware
 Backdoors
 Rootkits
 Malware is any software intentionally designed to
cause damage to a computer, server or computer
network. Malware does the damage after it is
implanted or introduced in some way into a
target’s computer and can take the form
of executable code, scripts, active content, and
other software.
 A computer virus is software usually hidden
within another seemingly innocuous
program that can produce copies of itself
and insert them into other programs or
files, and that usually performs a harmful
action (such as destroying data).
 A Trojan horse is a harmful program that
misrepresents itself to masquerade as a
regular, benign program or utility in order to
persuade a victim to install it. A Trojan
horse usually carries a hidden destructive
function that is activated when the
application is started.
 A computer worm is a
standalone malware computer program that
replicates itself in order to spread to other
computers. Often, it uses a computer network to
spread itself, relying on security failures on the
target computer to access it. Worms almost
always cause at least some harm to the network,
even if only by consuming bandwidth, whereas
viruses almost always corrupt or modify files on a
targeted computer.
 Spyware is malware that collects
information from a computer and then
transmits this information to an outside
entity without the knowledge or consent
of the computer owner.
 A backdoor is a method of bypassing
normal authentication procedures, usually
over a connection to a network such as the
Internet. Once a system has been
compromised, one or more backdoors may
be installed in order to allow access in the
future, invisibly to the user.
 Once malicious software is installed on a
system, it is essential that it stays concealed,
to avoid detection. Software packages known
as rootkits allow this concealment, by
modifying the host's operating system so that
the malware is hidden from the user. Rootkits
can prevent a harmful process from being
visible in the system's list of processes, or
keep its files from being read.

TIC

  • 1.
    By: Gonzalo Linares,Diana Barbed & Víctor Medina
  • 2.
     Viruses  Trojans Worms  Spyware  Backdoors  Rootkits
  • 3.
     Malware isany software intentionally designed to cause damage to a computer, server or computer network. Malware does the damage after it is implanted or introduced in some way into a target’s computer and can take the form of executable code, scripts, active content, and other software.
  • 4.
     A computervirus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data).
  • 5.
     A Trojanhorse is a harmful program that misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started.
  • 6.
     A computerworm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • 7.
     Spyware ismalware that collects information from a computer and then transmits this information to an outside entity without the knowledge or consent of the computer owner.
  • 8.
     A backdooris a method of bypassing normal authentication procedures, usually over a connection to a network such as the Internet. Once a system has been compromised, one or more backdoors may be installed in order to allow access in the future, invisibly to the user.
  • 9.
     Once malicioussoftware is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.