Computer security is the process of preventing and detecting unauthorized use of your computer.
- Virus is a type of malicious software program (malware) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying Example Code Red, Nimba, SirCam, Ripper, Melissa, MDMA, One Half.
- Boot Virus (Trojans) affect the disc operating system, thereby corrupting the booting files in spite of the operating system The main distinction is that they don’t replicate but spread on opening and email attachment specifically.
- Macro Virus (Worms) are intended to affect data files specifically by finding vulnerabilities in word or Excel They infect by replicating to other systems in the network. They don’t require a host file to replicate themselves.
- Virus Hoax is a message warning the recipient of a non-existent computer virus threat.
- Companion Virus is a complicated computer virus which unlike traditional viruses, do not modify any files.
- Spyware: It is software that secretly collects user information while on the Spyware can capture information like web browsing habits, address messages, usernames and passwords and credit card information.
- Adware: This program launches the advertisements in the form of pop-ups. Usually the add Words are based on the Internet behaviour of the user.
- Spam: These are unwanted In other words we can call them as unsolicited promotional mail.
- Pharming: More advanced method of phishing in which the attackers create duplicate or similar looking website of other companies, to attract customers and steal the data.
- Cookies: Is a program or information secretly stored in a computer especially the internet browser which allows other users to monitor the internet activities of a These programs usually monitor the browsing nature of a person so that the companies can create better marketing strategies.
- Mail Bomb: An excessively large email (typically many thousands of messages) or one large message send to a user’s email This is done to crash the system and prevent genuine messages from being recovered.
- Scareware: A common trick cyber criminals use to make users think that their Computer has become infected with malware to get them to purchase a fake applicaton.
- Sniffers: A software program used to monitor the traffic in a The hacker’s main use the sniffed data to access important confidential data.
- Rootkit: A program designed to hide objects such as processes, files or Windows registry entries (often including its own).
- Phishing: This is acquiring the personal and sensitive information of a person through official looking Users of online banking and e-commerce websites are more prone to this attack.
- Spoofing: It is a type of scam where an Intruder attempts to gain unauthorized access to a user’s system or information by pretending to be the
Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
Adware, or advertising-supported software, is any software package that automatically renders advertisements in order to generate revenue for its author.
Anti-virus software is a program or set of programs that are designed to prevent, search for, detect and remove software viruses and other malicious software like worms, Trojans, and adware.
Zombie is a computer connected to the internet that has been compromised by a hacker, computer virus or Trojan horse program and can be used to perform malicious task of one sort or another under remote direction.