Accessible Online Security

Logo

A comprehensive guide to Online Security. This is a Mozilla Open Leaders X Project.

View the Project on GitHub BrianObilo/onlinesecurity.github.io

Table of Contents

  1. Introduction
  2. Introduction to Cybersecurity
  3. Cybersecurity Threats
  4. Personal Security
  5. Password Security
  6. Secure Online Communications

3.2 Malware

Malware is short for malicious software, meaning software that can be used to compromise computer functions, steal data, bypass access controls, or otherwise cause harm to the host computer.

Malware is a broad term that refers to a variety of malicious programs. This module will define several of the most common types of malware such as adware, spyware, Trojan horses, viruses, and worms.

Malware attack

Different kinds of malware

1. Viruses

A form of malware that is capable of copying itself and spreading to other computers. Viruses can be used to steal information, harm host computers and networks, create botnets, steal money, render advertisements, and more.

2. Ransomware

A form of malware that essentially holds a computer system captive while demanding a ransom. The malware restricts user access to the computer either by encrypting files on the hard drive or locking down the system and displaying messages that are intended to force the user to pay the malware creator to remove the restrictions and regain access to their computer.

3. Spyware

A type of malware that functions by spying on user activity without their knowledge. These spying capabilities can include activity monitoring,collecting keystrokes, data harvesting (account information, logins, financial data), and more.

4. Adware

A type of malware that delivers advertisements that are displayed by software. Often times software and applications offer “free” versions that come bundled with adware.

5. Rootkit

A rootkit is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs. Once a rootkit has been installed it is possible for the malicious party behind the rootkit to remotely execute files, access/steal information, modify system configurations, alter software (especially any security software that could detect the rootkit), install concealed malware, or control the computer as part of a botnet.

6. Trojan Horse

Commonly known as a “Trojan,” is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware. A Trojan can give a malicious party remote access to an infected computer. Once an attacker has access to an infected computer, it is possible for the attacker to steal data (logins, financial data, even electronic money), install more malware, modify files, monitor user activity (screen watching, keylogging, etc), use the computer in botnets, and anonymize internet activity by the attacker.

Malware Symptoms

While these types of malware differ greatly in how they spread and infect computers, they all can produce similar symptoms.

Computers that are infected with malware can exhibit any of the following symptoms:

Malware Prevention and Removal

There are several general best practices that organizations and individual users should follow to prevent malware infections.

Some malware cases require special prevention and treatment methods, but following these recommendations will greatly increase a user’s protection from a wide range of malware:

Malware meme

Next > 3.3 Malicious Websites