Advanced Cyber Security

Encyclopedia / Encyclopedia Part 2 /


Security experts were able to record various kinds of programs, which were all aimed at causing harm on other computer systems.

And, progress also occurs among these threats along with the development made on certain security devices. Along with the many security dangers lurking in the web, which were found to have brought about danger on many machines, is the malware.

Malware is the shorter term used to indicate the malicious software

This program is created solely for the purpose of gaining illegal access into another computer system.

The intruder may enter freely using this tool without even asking for consent from the owner of the affected machine.

This word is the universal term used by experts when pertaining to the different forms of software or program code that are aggressive, aggravating, as well as invasive.

There are times when “computer virus” is used in order to denote all forms of malicious software and genuine viruses.

On the other hand, the law considers the malicious software as a computer contaminant.

A piece of software may be deemed as a malware when the objective of its creator is taken into account.

The goal of the crook is more important than any of the specific characteristics of the malware that he or she created.

There are several types of malware existing as of the present and these are: worms, spyware, computer viruses, trojan horses, rootkits, adware, crimeware, and other bits of software that are intended for causing harm on other systems.

Contrary to other’s beliefs, malware is not similar in any way to a piece of defective software.

Detective software is created for a legal purpose but unfortunately holds dangerous security holes.

Malware is usually categorized into how an attack is launched when the program has been spread over the web.

The classification is also based on how the malicious software is distributed to numerous computer systems and the kind of effect it has on a machine.

Utm firewall Appliance

➤ Related pages
Application Security
Black box
Blind SQL Injection
Blue box
Global System for Mobile GSM
Internet Filter
Logic Attack
Logic Bomb
Man in the Middle Attack
PCI-DSS Compliance
Red box
Server Spam Filter
Shoulder Surfing
What is 2600?
What is SANS Top 20?
What is Zero Day?
What is a Botnet?
What is vlan tagging?