Malicious Software (Malware)
Worm
- Standalone program, does not need to be run
- Exploit vulnerabilities in the destination to spread automatically
Virus
- Embeds itself into other programs
- Requires the user to run it
Trojan
- Disguised (i.e., games)
- Cannot self replicate
- Often act as a backdoor to enable remote exploitation
- Frequently used in DDoS attacks
Spyware
- Monitors and collects personal data without user knowledge
Root-Kit
- Provides kernel level system access
- Can act as a backdoor
Phishing
- Manipulating a victim (i.e., using email) into giving away private information
- Fake parcel messages
- Fake bank messages