(This video chapter begins at 02:20 and ends at 04:03. Click on the blue dot at the 02:20 timestamp to play the video for this module.)
”Malware” is the shortened form for malicious software, which is intrusive software, used to perform actions such as interrupting computer operations and obtaining sensitive information. Acquiring access to private computer systems and brandishing unsolicited advertising, are also characteristics of Malware
Our focus quote for this module:
“Cyber bullies can hide behind a mask of anonymity online, and do not need direct physical access to their victims to do unimaginable harm.” – Anna Maria Chavez
A computer worm is an independent malware program that reproduces itself to infect other computers. It can spread to other computers without having to attach to an existing program, but still causes some form of damage to the network.
Damage done by worms includes:
A computer virus is a program that hides within a harmless program and reproduces itself to perform actions, such as destroying data. It can infect files, and when the file is opened, spread the virus throughout your computer. The virus will further spread if the infected file is shared with others.
Damage done by viruses includes:
The main purpose of Spyware is to obtain information about an individual or company without their knowledge or consent. The data gathered from this act of “spying” is sometimes sent to another entity. It can also be used to gain control over one’s computer without the user realizing it. It is commonly used to track the user’s movements and bombard the user with pop-up ads.
Damage done by spyware includes:
Trojans gain access into computers by misleading users as to what it is truly meant to do. They spread in sneaky ways. For example, a user may receive an email attachment that appears to be legitimate, but when they open it, it in fact, gives the attacker the opportunity to obtain the user’s personal information, such as banking details and passwords.
Damage done by Trojans includes:
Many employees at XYZ Company have noticed that their computers are moving slowly. Harry has complained that somehow the settings he previously had on his computer have changed. Also, when he types in a particular URL for a website, his browser takes him somewhere completely different. Tom notices that files that are supposed to be saved to his computer have been deleted. Harry and Tom go to their supervisor, Jerry, to inquire about what is going on. Jerry turns on his computer and observes similar issues.