Understanding Malware and Cybercrime: A Comprehensive Guide

Classified in Technology

Written at on English with a size of 4.02 KB.

Malware

Malicious software, is a type of software that has been particularly designed to gain access to or damage a computer, mostly without the knowledge of the owner. There are a lot of types of malware, including computer worm, computer viruses, Trojan horse, adware and spyware.

Computer Crime

Defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business secrets or use the internet for malicious purposes.

Trojan Horse

A type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers that offer useful things but carry out destructive acts.

Worm

A type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage, they host on the workstations memory.

Spam

Is electronic emails and newsgroups usually with a commercial aim spam is most recognized as 'junk email'.

Adware

Is the name of the advertisements that appear on your computer, it changes your searches to advertising websites, adware collects data about you, just like the websites you visit.

Cyberbullying

Bullying through electronic devices, computers, cell phones, etc. Cyberbullying is about sending, posting personal information that usually is embarrassing for the victim, posting humiliating pictures is also part of this issue.

Difference Between

Logic bomb is programmed to act in a particular event and Time bomb is when the bomb is activated for an event related by the time.

Phishing

When a fake email is sent to a user with business information, like you have to pay something you already paid, or asking for your bank account number because apparently it has been hacked.

Keylogger

The act of recording the keys being pressed on the keyboard, it can record messages, emails, or other information that you.

Logical Methods

Firewall

A program that controls the access of unauthorized information to a private network.

Antiviruses

Software that advises or removes malware on computer systems.

  • Frequently do backups of the files and information inside of the computer.

  • Smart badges, these are plastic electronic cards to access for personal information between other things.

  • RFID (Radio-Frequency Identification).

Physical Methods

  • Well refrigerate the room.

  • Lock the rooms.

  • Back up power.

  • Sometimes is recommended to do a control of the computer.

Awareness Methods

  • Difficult password to guess but easy to remember.

  • Log off the computer after using it.

  • Know about e-crime.

  • 'Safety elimination'.

Entradas relacionadas: