Module 3 – Recruiting and Interviewing


(This video chapter begins at 02:20 and ends at 04:03. Click on the blue dot at the 02:20 timestamp to play the video for this module.)

Types of Malware

”Malware” is the shortened form for malicious software, which is intrusive software, used to perform actions such as interrupting computer operations and obtaining sensitive information. Acquiring access to private computer systems and brandishing unsolicited advertising, are also characteristics of Malware

Our focus quote for this module:

Cyber bullies can hide behind a mask of anonymity online, and do not need direct physical access to their victims to do unimaginable harm.” – Anna Maria Chavez

 

Worms

A computer worm is an independent malware program that reproduces itself to infect other computers. It can spread to other computers without having to attach to an existing program, but still causes some form of damage to the network.

Damage done by worms includes:

  • Bandwidth consumption
  • Stopping active anti-malware service
  • Immobilizing Safe Mode
  • Hindering Windows auto update

 

Viruses

A computer virus is a program that hides within a harmless program and reproduces itself to perform actions, such as destroying data. It can infect files, and when the file is opened, spread the virus throughout your computer. The virus will further spread if the infected file is shared with others.

Damage done by viruses includes:

  • Corrupting files
  • Computer slowdown
  • Taking over basic functions of the operating system

 

Spyware

The main purpose of Spyware is to obtain information about an individual or company without their knowledge or consent. The data gathered from this act of “spying” is sometimes sent to another entity. It can also be used to gain control over one’s computer without the user realizing it. It is commonly used to track the user’s movements and bombard the user with pop-up ads.

Damage done by spyware includes:

  • Collecting personal information
  • Installing unsolicited software
  • Redirecting web browsers
  • Changing computer settings
  • Slowing down Internet connection

 

Trojans

Trojans gain access into computers by misleading users as to what it is truly meant to do. They spread in sneaky ways. For example, a user may receive an email attachment that appears to be legitimate, but when they open it, it in fact, gives the attacker the opportunity to obtain the user’s personal information, such as banking details and passwords.

Damage done by Trojans includes:

  • Crashing the computer
  • Deleting files
  • Corrupting data
  • Logging keystrokes

 

Practical Illustration

Many employees at XYZ Company have noticed that their computers are moving slowly. Harry has complained that somehow the settings he previously had on his computer have changed. Also, when he types in a particular URL for a website, his browser takes him somewhere completely different. Tom notices that files that are supposed to be saved to his computer have been deleted. Harry and Tom go to their supervisor, Jerry, to inquire about what is going on. Jerry turns on his computer and observes similar issues.