Understanding Malware and Cybercrime: A Comprehensive Guide
Classified in Technology
Written at on English with a size of 4.02 KB.
Malware
Malicious software, is a type of software that has been particularly designed to gain access to or damage a computer, mostly without the knowledge of the owner. There are a lot of types of malware, including computer worm, computer viruses, Trojan horse, adware and spyware.
Computer Crime
Defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business secrets or use the internet for malicious purposes.
Trojan Horse
A type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers that offer useful things but carry out destructive acts.
Worm
A type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage, they host on the workstations memory.
Spam
Is electronic emails and newsgroups usually with a commercial aim spam is most recognized as 'junk email'.
Adware
Is the name of the advertisements that appear on your computer, it changes your searches to advertising websites, adware collects data about you, just like the websites you visit.
Cyberbullying
Bullying through electronic devices, computers, cell phones, etc. Cyberbullying is about sending, posting personal information that usually is embarrassing for the victim, posting humiliating pictures is also part of this issue.
Difference Between
Logic bomb is programmed to act in a particular event and Time bomb is when the bomb is activated for an event related by the time.
Phishing
When a fake email is sent to a user with business information, like you have to pay something you already paid, or asking for your bank account number because apparently it has been hacked.
Keylogger
The act of recording the keys being pressed on the keyboard, it can record messages, emails, or other information that you.
Logical Methods
Firewall
A program that controls the access of unauthorized information to a private network.
Antiviruses
Software that advises or removes malware on computer systems.
Frequently do backups of the files and information inside of the computer.
Smart badges, these are plastic electronic cards to access for personal information between other things.
RFID (Radio-Frequency Identification).
Physical Methods
Well refrigerate the room.
Lock the rooms.
Back up power.
Sometimes is recommended to do a control of the computer.
Awareness Methods
Difficult password to guess but easy to remember.
Log off the computer after using it.
Know about e-crime.
'Safety elimination'.