This study describes the three major types of computer malware - viruses, worms, and spyware with their examples and impacts. It also recommends adopting high-level security systems to prevent malware attacks. The document type is an essay and the subject is computer science. No course code, course name, or college/university is mentioned.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Types of computer malware
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COMPUTER MALWARE 2 Introduction Malware is defined as computer software which is used by the criminals in order to block the computer servers of the consumer. There are major three kinds of computer malware identified such as worms, spyware and viruses (ChandramohanandTan65- 71).The objective of this study is to describe the impact of viruses, spyware and worms with their examples. Virus It is a part of computer malware which is produced by hackers in order to enter into the consumer personal devices. They send a large number of viruses produced by malware software into the human computer system and reduce the performance of their networks(GadhiyaandBhavsar12-14).Itaffectsthepersonaldatafilesand information of consumer and the use of unwanted signals and software can cause the computer virus. Example:In the year 1986 amjad and basit developed the C-brain software in order to collect the personal data and information of the consumer. It was one of the famous viruses that impacted on the million consumer private computers. This virus was entered in the computer when the computer is booted. Worms The computer worm is a part of computer malware which is divided as the sub-class of the computer virus. The major difference is that a worm does not need individual intervention to spread but in the case of the virus, the consumer must perform an action
COMPUTER MALWARE 3 to keep spreading the virus. Lack of security, use of third party applications are caused by computer worms(Peng,YuandYang925-941). Example:in year 200, the I LOVE YOU worm was produced and spread with the help of email and users clicked on these links due to which they lost their private details. It also impacts on the human personal devices, account details, data files and so on. Such infection could overwrite many of consumer data on the infected PC. Spyware Spyware is defined as the malware software which is involved in the hacking in order to collect the personal data and information of users and companies (Saracinoet al.83- 97). Use of fraud mails and links, lack of security, use of unauthentic servers and networks all these are major key factors which can cause the problem of spyware. Example:cool web search is one of the best examples of spyware which takes benefits of the security threats and vulnerabilities in the internet explorer to hack the browser. Moreover, it also impacts on human personal information like login ID, passwords, photos and other financial documents. Mainly it changes the browser setting and transfers the browsing information to their researcher (Saracinoet al.83-97). Conclusion This study described the concept of a computer virus, spyware, and worms with their causesandimpacts.Withthehelpofthispaper,readerscanunderstandthe fundamental of computer malwares and there are various examples also added for better understanding their impacts. It is concluded that these computer malwares impact on the consumer private details and users use the unauthentic networks and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
COMPUTER MALWARE 4 third party application which increase the rate of computer malware. Therefore, it is recommended users should ensure that they use only authentic servers and adopt the high level security systems like encryption, firewall and so on.
COMPUTER MALWARE 5 Works cited Chandramohan, Mahinthan, and Hee Beng Kuan Tan. "Detection of mobile malware in the wild."Computer45.9 (2012): 65-71. Gadhiya, Savan, and Kaushal Bhavsar. "Techniques for malware analysis."International Journal of Advanced Research in Computer Science and Software Engineering3.4 (2013): 12-14. Peng, Sancheng, Shui Yu, and Aimin Yang. "Smartphone malware and its propagation modeling: A survey."IEEE Communications Surveys & Tutorials16.2 (2014): 925- 941. Saracino,Andrea,etal."Madam:Effectiveandefficientbehavior-basedandroid malware detection and prevention."IEEE Transactions on Dependable and Secure Computing15.1 (2018): 83-97.