<<

NINE TYPES OF VIRUS Software program that restricts access Viruses are initially contracted via to a unless a ransom is paid. software and then they can spread from one computer to another ORM over a network or the , or W through removable devices, such A malicious software program as CDs or thumb drives. The virus that like a virus can replicate VIRUS could corrupt, steal, or delete data itself, but it does not rely on on your computer. human action so it is very speedy in its rate of infection. RANSOMWARE ROOTKIT /BOT Software that gains Software robots that affect a administrator access to modify group of (zombies) system functions and avoid that are controlled by a botnet mal·ware detection by security measures. originator to create damage noun through activities such as WORM COMPUTING TROJAN distributing spam to the email software that is intended to HORSE contact addresses or damage or disable computers and As the name suggests, this is overwhelming a server or software that seems legitimate, website through a computer systems. but hides its malicious intent. It denial-of-service (DoS) attack. pretends to be a useful program, but when run, it can allow KEYLOGGER access to computers. Software that records keystrokes, BOTNET which may then be uploaded to a /BOT remote server where it is analyzed to PYWARE steal , credit card S numbers, or other private data. Once installed on a computer, spyware allows a to KEYLOGGER monitor a user’s activity, such as ADWARE ADWARE keystrokes, without their Software program that may come with knowledge and may affect the spyware to display unwanted advertising user’s ability to control their on your computer. computer.

If you have questions about malware and how to keep your company protected call Focus Data Solutions.

1020 N. Fairfax Street, Suite 400, Alexandria, VA 22314 | 703-836-0080 | www.focusdatasolutions.com