Categories: Uncategorised

Malware and its Types

 

Types of malware: Relevance

  • GS 3: Awareness in the fields of IT, Space, Computers, robotics, Nano-technology, bio-technology and issues relating to intellectual property rights.

 

What is a malware?

  • Malware, or malicious software, is a program designed to gain access to computer systems, normally to harm or exploit any programmable device or network.
  • Systems or devices infected with malware will show symptoms such as running slower, sending emails without user action, randomly rebooting, or starting unknown processes.

 

 

Types of malware

  • A malware can come in many forms; however, the most common types are discussed below:

 

Virus

  • Virus is the most commonly known malware type that is capable of infecting other files and spreading to other computers.
  • A virus is capable of infecting other files and spreading to other computers. The virus spreads when an infected file is passed from system to system.
  • In this sense, they do not spread on their own and require an unsuspecting user to execute them for the initiation of the malicious behaviour.

 

Worms

  • A worm is very much like a virus but it can self-replicate without a host program and spreads without any human interaction.
  • Worms usually slow down networks. A virus needs a host program to run but worms can run by themselves.
  • After a worm affects a host, it is able to spread very quickly over the network.

 

Spyware

  • It is a type of malware whose purpose is to steal private information from a computer system for a third party. Spyware collects information and sends it to the hacker without the user’s knowledge.
  • Attackers usually spy on information such as passwords or pins (usually through key loggers), credit card information, intellectual property or other personal information.

 

Trojan horse

  • Trojan horses (or Trojan), as the name suggests, disguise themselves as desirable code or normal file or program to trick users into downloading and installing them.
  • A Trojan horse varies from a virus as a trojan horse binds itself to non-executable files, such as image files, audio files.
  • One popular attack type is displaying a pop up that claims the victim’s computer is infected, so that the user can be tricked into installing the malware that masquerade as an antivirus program.
  • Trojans are one of the most common malware and are it is hard to defend against them. This is due to the fact that they spread by tricking users, which eliminates many traditional or technical control measures to prevent them.

 

 

Ransomware or Crypto-malware

  • It is one of the most prevalent types of malware.
  • A ransomware is a malware that uses encryption to disable a victim’s access to its own data and demands a ransom, usually in a cryptocurrency in return to decrypt the encrypted data.

 

Rootkit

  • It is a type of malware that gives attackers remote control of a victim’s computer with full administrative privileges.
  • In most of the cases, they spread through malicious downloads, phishing or malicious attachments.

 

Logic bombs

  • A logic bomb is a malicious program that uses a trigger to activate the malicious code. The logic bomb remains non-functioning until that trigger event happens.
  • Once triggered, it implements a malicious code that causes harm to our computer.
  • Cybersecurity specialists have discovered logic bombs that attack and destroy the hardware components in a workstation or server. The logic bomb overdrives these devices until they overheat or fail.

 

Ways to prevent malware attacks

Though it is not completely possible to eliminate the malware attacks, following can be the proposed solutions to mitigate the malware attacks:

  • Develop updated security policies
  • Implement security awareness training programmes
  • Use of App-Based Multi-Factor Authentication
  • Install Anti-Malware & Spam Filters.
  • Perform routine vulnerability assessments

 

Also Read:

Domestic Systematically Important Insurers Rani Velu Nachiyar- Jhansi Rani of Tamil Nadu Solid State Lithium Metal Battery Azadi Ka Amrit Mahotsav- Climate Change Awareness Campaign and National Photography Competition
Balance of Payment National Educational Alliance for Technology (NEAT) Scheme Government Planning to Blend Green Hydrogen with Natural Gas District Good Governance Index (DGGI)
James Webb Telescope NITI Aayog signs a SoI with the UNWFP- Strengthening Climate Resilient Agriculture National Mission on Edible Oil- Oil Palm Business Summit Foreign Contribution Regulation Act
parag

Recent Posts

Indo-Gangetic-Brahmaputra Plains: Vibrant River and Features

The Indo-Gangetic-Brahmaputra Plains, nestled between the Himalayas and Deccan Plateau, make up the world's biggest…

13 hours ago

Rig Vedic Gods, Goddesses List in Ancient Indian Mythology

The Rigvedic gods are the deities who are referenced in the Rigveda. Evolving between 500…

13 hours ago

JPSC Notification 2024, Check JPSC Mains Exam Date

The Jharkhand Public Service Commission (JPSC) released the JPSC notification 2024 in January on the…

14 hours ago

MPPSC Exam Date 2024, Check New Prelims Exam Date

The Madhya Pradesh Public Service Commission (MPPSC) issued the MPPSC Notification 2024 in the previous…

14 hours ago

What is the National Game of India?

Field hockey proudly bears the distinguished honor of being India's national game, intricately intertwined with…

14 hours ago

UPSC IES ISS Notification 2024, Check IES ISS Exam Schedule

UPSC ISS IES notification 2024 has been released for 48 posts on its website at…

17 hours ago