This task is completed by :


  1. AMMIRUL MIRZA BIN ANUAR
  2. MUHAMMAD ZAHIRUDDIN BIN ABDUL HADI
  3. MUHAMAD AFFAN BIN AB AZID
  4. SHAHIRA BINTI SAMAT




2. Discuss different types of threats and malicious program (malware) that can damage a computer, mobile device or disrupt any system.

Search for information on current known malware program. Based on the information that you have found, create a table to list different types of malware, what it does, and how it can be repaired or removed. These information is useful for you to prevent any malware from damage your computer system .



Malware that can damage a computer :


  1. Adware
  2. Bots
  3. Bug
  4. Ransomware
  5. Rookit



Adware : malware that automatically delivers advertisments.

 E.g  -  include pop-up ads on website and advertisement that are display by software . Beware of dickable advertisements 

How to avoid - Try to avoid programs especially freeware that flash dickable ads .





Bots : created  for relatively harmfless purpose in video gaming,internet auctions, online contests, etc

How to avoid - Websites can guard against bots with CAPTCHA tests that verify users as human.





Bug : is a flaw produces an undesired outcomes. These flaw are results of human error and typically exists in the source code or compilers of a program.

How to avoid - Can be prevented with developer education, quality control and code analysis tools





Ransomware : essentially holds a computer system captire while demanding a ransom. It restricts user access to the computer either by encrypting on the hand drive.

How to avoid - Antivirus and anti-malware help protect  your data by stopping ransomware attacks before they can touch and the data





Rookit : designed to remotely access or control a computer without being deleted by users or security programmes. It can remotely execute files , access / steal information, modify system configuration, after software, install concealed malware, etc

How to avoid - Can use manual method (monitoring comp behavior for irregular activity, signature scanning)

0 comments:

Leave a Comment

Back to Home Back to Top HAYAT 3 GROUP 13 :) !. Theme ligneous by pure-essence.net. Bloggerized by Chica Blogger.