Malicious Software (Malware)

  • Unwanted
  • Dangerous

Worm

  • Standalone program, does not need to be run
  • Exploit vulnerabilities in the destination to spread automatically

Virus

  • Embeds itself into other programs
  • Requires the user to run it

Trojan

  • Disguised (i.e., games)
  • Cannot self replicate
  • Often act as a backdoor to enable remote exploitation
    • Frequently used in DDoS attacks

Spyware

  • Monitors and collects personal data without user knowledge

Root-Kit

  • Provides kernel level system access
  • Can act as a backdoor

Phishing

  • Manipulating a victim (i.e., using email) into giving away private information
    • Fake parcel messages
    • Fake bank messages