0% found this document useful (0 votes)
58 views1 page

Terminology of Malicious Programs

The document lists and describes common types of malware including viruses, worms, Trojan horses, backdoors, exploits, downloaders, auto-rooters, virus kits, spammers, flooders, keyloggers, rootkits, and zombies.

Uploaded by

Mmk Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views1 page

Terminology of Malicious Programs

The document lists and describes common types of malware including viruses, worms, Trojan horses, backdoors, exploits, downloaders, auto-rooters, virus kits, spammers, flooders, keyloggers, rootkits, and zombies.

Uploaded by

Mmk Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Name Description

Virus Attaches itself to a program and propagates copies of itself to other


programs
Worm Program that propagates copies of itself to other computers
Logic bomb Triggers action when condition occurs
Trojan horse Program that contains unexpected additional functionality
Backdoor Program modification that allows unauthorized access to functionality
(trapdoor)
Exploits Code specific to a single vulnerability or set of vulnerabilities
Downloaders Program that installs other items on a machine that is under attack.
Usually, a downloader is sent in an e-mail.
Auto-rooter Malicious hacker tools used to break into new machines remotely
Kit (virus Set of tools for generating new viruses automatically
generator)
Spammer Used to send large volumes of unwanted e-mail
programs
Flooders Used to attack networked computer systems with a large volume of
traffic to carry out a denial of service (DoS) attack
Keyloggers Captures keystrokes on a compromised system
Rootkit Set of hacker tools used after attacker has broken into a computer
system and gained root-level access
Zombie Program activated on an infected machine that is activated to launch
attacks on other machines

You might also like