- AMMIRUL MIRZA BIN ANUAR
- MUHAMMAD ZAHIRUDDIN BIN ABDUL HADI
- MUHAMAD AFFAN BIN AB AZID
- SHAHIRA BINTI SAMAT
2. Discuss different types of threats and malicious program (malware) that can damage a computer, mobile device or disrupt any system.
Search for information on current known malware program. Based on the information that you have found, create a table to list different types of malware, what it does, and how it can be repaired or removed. These information is useful for you to prevent any malware from damage your computer system .
Malware that can damage a computer :
- Adware
- Bots
- Bug
- Ransomware
- Rookit
Adware : malware that automatically
delivers advertisments.
E.g - include pop-up ads on website and
advertisement that are display by software . Beware of dickable advertisements
How to avoid - Try to avoid programs especially freeware that flash dickable ads .
Bots : created for relatively harmfless purpose in video
gaming,internet auctions, online contests, etc
How to avoid - Websites can guard against bots
with CAPTCHA tests that verify users as human.
Bug : is a flaw produces an undesired
outcomes. These flaw are results of human error and typically exists in the source code
or compilers of a program.
How to avoid - Can be prevented with developer education,
quality control and code analysis tools
Ransomware : essentially holds a computer
system captire while demanding a ransom. It restricts user access to the
computer either by encrypting on the hand drive.
How to avoid - Antivirus and anti-malware help protect your data by
stopping ransomware attacks before they can touch
and the data
Rookit : designed to remotely access or
control a computer without being deleted by users or security programmes. It
can remotely execute files , access / steal information, modify system
configuration, after software, install concealed malware, etc
How to avoid - Can use manual method (monitoring
comp behavior for irregular activity, signature scanning)
0 comments:
Leave a Comment