0% found this document useful (0 votes)
9 views

Threats Assignment

The document discusses various types of malware, including viruses, spyware, Trojans, worms, adware, ransomware, and identity theft, highlighting their characteristics and potential threats to computer security. It emphasizes the importance of awareness and protective measures such as antivirus software and secure practices to mitigate risks. Additionally, it touches on cyberterrorism as a serious threat to governments and economies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Threats Assignment

The document discusses various types of malware, including viruses, spyware, Trojans, worms, adware, ransomware, and identity theft, highlighting their characteristics and potential threats to computer security. It emphasizes the importance of awareness and protective measures such as antivirus software and secure practices to mitigate risks. Additionally, it touches on cyberterrorism as a serious threat to governments and economies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 9

1

Bringing an end to these threats and


crimes that can occur on your computer is
difficult hence we should bring awareness
instead. Here is a list of malwares that can
damage your computer.

2
Table of Contents
Malware 4
identity Theft 5

Credit card fraud 6

𝐕𝐢𝐫𝐮𝐬𝐞𝐬 7

Spyware 8

Trojans 9

Worms 10

Adware 11

Ransomware 12

Cyberterrorisms 13

Bibliography 14

3
Malware
Malware also known as malicious software is the term used to describe
harmful and intrusive software developed by hackers to control and harm
your computer. There are types of malwares which include ransomware,
spyware, worms and trojans . Malware can be installed secretly by hackers
on the computer to gain unauthorized access. As a result of these
softwares being created, hackers are able to get sensitive and personal
information on a person. One can install an antivirus software such as
Norton 360 and frequently update and backup files on your computer

Identity Theft
Identity theft is a crime and a form of fraud where a criminal tends to
gather personal information on an individual and pretends to be them.
They obtain the person’s full name, address, passport number, family,
nationality, date and country of birth, credit card details and insurance
accounts and get benefits from medical care. Furthermore, They mainly
perform this crime through electronics but some sift through garbage bin
search for credit card and bank account statements. Moreover, you should
secure your credit card and personal information and remove old deposit
slips.

4
Credit card fraud

Normally, when certain businesses such as online shopping sell their


products and services on the internet, the customer usually pays over the
internet with their credit cards or debit card. This fraud can occur when an
unauthorized user gets access to a person’s credit or debit card
information while they are in the middle of a purchase and takes over the
account. You should protect your debit and credit card password and
decline when websites ask to “remember”
your credit card number.

𝐕𝐢𝐫𝐮𝐬𝐞𝐬

A virus spreads through your personal device. A computer virus is a code


designed to accomplish malicious acts to your device. It is self-replicating
and spreads very quickly infecting the host (electronic device) taking
personal information and spoiling documents. Many viruses attach
themselves to an executable file on the host which allows the virus to
spread when the user opens a file. To avoid it you can install antivirus
softwares for protection against these viruses and you can avoid
suspicious malwares such as ads and bots.

5
Spyware
It is a type of malware intended to gather data on users without their
consent and knowledge. Its purpose is to spy and monitor the activity the
user undertakes on their computer. It allows hackers to see your
conversations, the data you send and receive, what websites you visited.
The hacker's intention is usually to send that information to a third party.
Avoid clicking on ads that pop up and install antivirus software.

Trojans
Like the infamous greek horse, Trojan is a computer malware that is
programmed to disguise itself as a harmless and safe program the user is
interested in and tricks them into switching it on to delete files and erase
your hard disks. They are also designed to spy and gather information on
a user to send to the developer. You can keep a firewall up to stop Trojan
from downloading into your computer and avoid clicking on pop up ads.

6
Worms
A malicious software program that reproduces itself spreads through
computers from another computer. It uses your internet and network
connection as they have no security and uses them as a host to infect and
jump to other computers. Furthermore, it supposedly can change their
profile to avoid detection. They use ‘payloads’ to assist them spread into
the computer faster and it overloads web servers. You can avoid these by
placing security measures on your computer and disconnecting your
computer if infected from the internet.

Adware
Another type of malware that automatically downloads itself onto the
user's computer without his/her knowledge. It refers to a program which
displays pop-up advertisements on your screen . Some adware comes in
the form of a browser extension or add-ons and sends frequent pop-ups. It
can slow down your computer and reduce your battery life. While it
distracts you with these ads it generates revenue to its developer. You
can run a scan and update your computer by date and block random pop-
up ads.

7
Ranso
mware
A type of malware that threatens the user to publish personal data and
blocks the user from gaining access to their data on their computer.
Hackers blackmail the user to pay a ransom fee to regain access to their
files. They usually have a timer, telling the user how much time they have
to pay and if they are not able to, they would lose their files. Never click
on unsafe links and use VPN services on public wifi networks to make the
device less vulnerable.

Cyberterrorisms
It is an act where hackers threaten and perform violent acts to coerce a
government or monetary resources through intimidation. It is performed
via the internet and can cause harm and destruction to personal
objectives. Nevertheless, it causes deaths and loss of properties.
Cyberterrorists who are skilled at hacking can damage the government
system and worldwide economic chaos. Ensure to secure wifi, browsers
and turn off computers when not in use.

8
Bibliography

Websites:
● https://www.wikipedia.org/
● https://www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-
malware.html#~what-is-malware
● https://www.proofpoint.com/us/threat-reference/ransomware

Books:
● Log on to IT
● Heinemann Information and Technology for Csec

You might also like