D A T A B A S E S E C U R I T Y
Home Lesson

MALWARE

Cybercriminals, state-sponsored hackers, and spies use advanced attacks that blend multiple tactics – such as spear phishing emails and malware – to penetrate organizations and steal sensitive data. Unaware that malware has infected their device; legitimate users become a conduit for these groups to access your networks and sensitive data.

Type of malware :

SPYWARE

spyware
Malicious behavior that aims to gather information about a person or organization and send such information to another entity in a way that harms the user; for example by violating their privacy or endangering their device's security

RANSOMEWARE

spyware
Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again

TROJANHORSE

spyware
A Trojan horse, or “Trojan”,enters your system disguised as a normal, harmless file or program designed to trick you into downloading and installing malware. As soon as you install a Trojan, you are giving cyber criminals access to your system.

WORM

spyware
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.






Countermeasure

Enable firewall protection and Install Antivirus.