CAplus-3: Computer Appreciation-Plus 3 by N. Nwankwo

CAplus-3: Computer Appreciation-Plus 3 by N. Nwankwo

Author:N. Nwankwo [Nwankwo, N.]
Language: eng
Format: epub
Publisher: Space-Era Data Services
Published: 2017-03-22T07:00:00+00:00


Chapter Three Computer Threat Appreciation

INTRODUCTION

By form of executable code, computer threat can spread from one computer to another if its host is taking to a targeted computer. For general classification, these threats include malware in the form of computer viruses, worms, Trojan horses, rootkits, spyware, adware and other malicious and unwanted software. Though, computer viruses are sometimes confused with some malware like worms and Trojan horses, which are technically different. For instance, a worm can exploit security vulnerabilities in order to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless, but hides malicious functions within itself. In the manner of viruses, both of them can harm a computer system's data or performance. As for spreading, a virus requires user intervention to spread, whereas a worm spreads itself automatically. Although, whether malware or virus, “infected users” are destined to experience system damaged or crashed, stolen of confidential information by unknown person or group via Internet usage, and other damages such as files destruction. Truly, how this virus originated has been major concern to computer users, both organizations, government and private individuals, therefore, their discussions cannot be ignore, and ways to combat them are ongoing processes.

So in this Chapter, whenever we mention malware, we are referring to computer viruses, worms, Trojan horses, spyware, adware, rootkits, and other malicious and unwanted software or programs. For the purpose of our learning, we will take a historical review of assumed origin of computer threats, look into the different meaning that people gave it, its nature and type, how to know when a system is infected, how to combat it, and ways to prevent it.

WHAT IS COMPUTER MALWARE When software is integrated with a virus during its development or through modification by another party, which is not actually the original developer, such software becomes malicious software, which is shortly called malware.

The name malware is common to every PC users, including Internet users. It is malicious software that is of encrypted or program coded. For encrypted code, it is written with an aim to secretly access the information of a computer user without the user consent or authorization. But, as a program code, it is installed or executed in any computing device without the knowledge of the owner, therefore against the owner’s wish. Moreover, their prevalence existence is the act of facilitating internet crimes to a very large rate and as well information destruction. For instance, it is fraudsters that create some of the malware, placed them online, and thus used them to gain access secretly to information of Internet users without their knowledge. It is obvious that most of this information include; bank transaction information, ATM card, Master Card information, and as well other information generally.

Adware: Been an advertising-supported program, it is any software package that automatically plays, displays, or downloads advertisements into a computer. It is often designed to follow up any Internet sites user visits and to present advertising pertinent to the types of goods or services featured there.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.