2. The Virus
A computer virus as a type of malware. Much like a biological virus, it is a program that
can replicate itself and spread from one computer to another. It is process of
replication that gave this type of program its name.
The Trojan Horse
This program disguises itself as another program (like a game or some other
application to download) thus tricking a user into allowing this piece of malware to
install itself into a computer. This program will attempt to destroy your computer upon
installation, sometimes going so far as to wipe your hard drive clean. A key difference
between this and a virus is that a Trojan Horse does not replicate itself.
3. Spyware
Spyware are programs installed on computers with the sole purpose stealing
information while causing performance issues by eating up bandwidth and
computer memory and resources. It seeks to covertly gather user information
through the user's internet connection without the user's knowledge. Many
items stolen by these programs are E-Mail addresses and credit card numbers
and even some passwords . Spyware enters a computer usually as a hidden
component of some freeware or shareware programs
Adware
Adware programs enter your computer very similarly to spyware. Unlike
however, these programs do not work covertly. Once infected with adware,
will notice an exorbitant amount of advertisements appearing as Pop-Ups on
your machine. These ads consume network space and hinder performance as
well as invite the unwitting to click on these ads and further infect their
with potentially more malicious software or steal information.
4. Bots
"Bot" is derived from the word "robot" and is an automated process that interacts with
other network services. This is collected in a single network ( Botnet ) where
programmed controls for this type of malignant and all the infected device called Bot
has called the word (zombie) , because he publishes the infection to others.
5. Phishing
(someone posing as your company online in an attempt to gain
personal data from your subscribers or employees)
Is short of fraud or deceive the person (social engineering) , in the sense
that doing a site similar to a commercial site 100% and have his content
request information entry or data update or add vista card and so on,
and sends the message quite similar to the messages of company and
be in the content request entry to the link to update data and
sometimes it can be mined link malicious files based on the way the
control device